Sciweavers

1018 search results - page 76 / 204
» Generative unbinding of names
Sort
View
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 2 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
SAC
2004
ACM
14 years 2 months ago
WebUml: reverse engineering of web applications
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...
WWIC
2004
Springer
123views Communications» more  WWIC 2004»
14 years 2 months ago
Experimental Analysis of Heterogeneous Wireless Networks
Packet loss and delay in Internet degrade the quality of requested services like VoIP (Voice over IP) or Video Streaming. In novel network scenarios where wired and wireless connec...
Giulio Iannello, Antonio Pescapè, Giorgio V...
ITNG
2010
IEEE
14 years 2 months ago
ACAT: A Web-Based Software Tool to Facilitate Course Assessment for ABET Accreditation
—There are several institutions that accredit educational programs and require documentation to ensure that an educational program regularly meets certain criteria. This paper fo...
Eugene Essa, Andrew Dittrich, Sergiu M. Dascalu, F...
DMS
2008
226views Multimedia» more  DMS 2008»
13 years 10 months ago
Towards Multi-provider LBS Visual Portals
Location-Based Services (LBS) are more and more commonly accessed through PDA or smart phones. As portals deriving of services delivered by a unique provider are easy to define, t...
Silvia E. Gordillo, Robert Laurini, Catalina Mosta...