Sciweavers

26354 search results - page 119 / 5271
» How we refactor, and how we know it
Sort
View
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 10 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 10 months ago
How Is Meaning Grounded in Dictionary Definitions?
Meaning cannot be based on dictionary definitions all the way down: at some point the circularity of definitions must be broken in some way, by grounding the meanings of certain w...
Alexandre Blondin Massé, Guillaume Chicoisn...
IJBIDM
2008
114views more  IJBIDM 2008»
13 years 10 months ago
Traffic mining in a road-network: How does the traffic flow?
: The flow of data coming from modern sensing devices enables the development of novel research techniques related to data management and knowledge extraction. In this work, we und...
Irene Ntoutsi, Nikos Mitsou, Gerasimos Marketos
IEICET
2006
84views more  IEICET 2006»
13 years 10 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda
IJISEC
2006
108views more  IJISEC 2006»
13 years 10 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt