Sciweavers

11097 search results - page 2076 / 2220
» Hera presentation generator
Sort
View
ACISP
2005
Springer
14 years 2 months ago
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
We deal with a divisor class halving algorithm on hyperelliptic curve cryptosystems (HECC), which can be used for scalar multiplication, instead of a doubling algorithm. It is not ...
Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
ATAL
2005
Springer
14 years 2 months ago
Modeling opponent decision in repeated one-shot negotiations
In many negotiation and bargaining scenarios, a particular agent may need to interact repeatedly with another agent. Typically, these interactions take place under incomplete info...
Sabyasachi Saha, Anish Biswas, Sandip Sen
BTW
2005
Springer
112views Database» more  BTW 2005»
14 years 2 months ago
Valid Updates for Persistent XML Objects
: XML has emerged as the industry standard for representing and exchanging data and is already predominant in several applications today. Business, analytic and structered data wil...
Henrike Schuhart, Volker Linnemann
CAISE
2005
Springer
14 years 2 months ago
A Meta Model for Process Mining Data
Abstract. Modern process-aware information systems store detailed information about processes as they are being executed. This kind of information can be used for very different p...
Boudewijn F. van Dongen, Wil M. P. van der Aalst
CCS
2005
ACM
14 years 2 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
« Prev « First page 2076 / 2220 Last » Next »