Sciweavers

5752 search results - page 1009 / 1151
» Informative Labeling Schemes
Sort
View
ISW
2004
Springer
14 years 2 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
ISW
2004
Springer
14 years 2 months ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...
JSSPP
2004
Springer
14 years 2 months ago
Reconfigurable Gang Scheduling Algorithm
 Using a single traditional gang scheduling algorithm cannot provide the best performance for all workloads and parallel architectures. A solution for this problem is the use of...
Luís Fabrício Wanderley Góes,...
DSRT
2003
IEEE
14 years 2 months ago
Interest Management in Agent-Based Distributed Simulations
Distributed simulation enables participants situated in different geographical locations to share a common virtual world, which is called a Distributed Virtual Environment (DVE). ...
Lihua Wang, Stephen John Turner, Fang Wang
ICDAR
2003
IEEE
14 years 2 months ago
On Machine Understanding of Online Handwritten Mathematical Expressions
This paper aims at automatic recognition of online handwritten mathematical expressions written on an electronic tablet. The proposed technique involves two major stages: symbol r...
Utpal Garain, B. B. Chaudhuri
« Prev « First page 1009 / 1151 Last » Next »