Sciweavers

247 search results - page 24 / 50
» Extracting All the Randomness from a Weakly Random Source
Sort
View
ICFCA
2009
Springer
14 years 4 days ago
Handling Large Formal Context Using BDD - Perspectives and Limitations
This paper presents Binary Decision Diagrams (BDDs) applied to Formal Concept Analysis (FCA). The aim is to increase the FCA capability to handle large formal contexts. The main id...
Andrei Rimsa, Luis E. Zárate, Mark A. J. So...
SASN
2004
ACM
14 years 29 days ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
SCIENTOMETRICS
2008
100views more  SCIENTOMETRICS 2008»
13 years 7 months ago
The influence of references per paper in the SCI to Impact Factors and the Matthew Effect
: All references data was extracted from the annual volumes of the CD-Edition of Science Citation Index (SCI) and the web of science of the Institute for Scientific Information (IS...
Mohammad Hossein Biglu
CRV
2011
IEEE
278views Robotics» more  CRV 2011»
12 years 7 months ago
Online Visual Vocabularies
Abstract—The idea of an online visual vocabulary is proposed. In contrast to the accepted strategy of generating vocabularies offline, using the k-means clustering over all the ...
Yogesh A. Girdhar, Gregory Dudek
INDOCRYPT
2005
Springer
14 years 1 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov