Sciweavers

5435 search results - page 81 / 1087
» Informed Detection Revisited
Sort
View
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
15 years 6 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
CISS
2007
IEEE
15 years 5 months ago
A Union Bound Approximation for Rapid Performance Evaluation of Punctured Turbo Codes
— In this paper, we present a simple technique to approximate the performance union bound of a punctured turbo code. The bound approximation exploits only those terms of the tran...
Ioannis Chatzigeorgiou, Miguel R. D. Rodrigues, Ia...
EUC
2007
Springer
15 years 5 months ago
GPS-Based Location Extraction and Presence Management for Mobile Instant Messenger
Abstract. Location is the most essential presence information for mobile users. In this paper, we present an improved time-based clustering technique for extracting significant lo...
Dexter H. Hu, Cho-Li Wang
CHI
2010
ACM
15 years 4 months ago
Multitasking bar: prototype and evaluation of introducing the task concept into a browser
This paper clarifies two common patterns of multitasking on the Web, namely Multiple Tasks (MT) and Multiple Session Task (MST). To support both of these, the task concept needs t...
Qing Wang, Huiyou Chang
116
Voted
DSS
2002
83views more  DSS 2002»
15 years 3 months ago
EIS support for the strategic management process
The success of an executive information system (EIS) depends upon many factors, including providing support for the strategic management process (SMP). The SMP is comprised of fiv...
Sanjay K. Singh, Hugh J. Watson, Richard T. Watson