Sciweavers

1249 search results - page 17 / 250
» Limitations of the Even-Mansour Construction
Sort
View
IJNSEC
2008
147views more  IJNSEC 2008»
13 years 9 months ago
Constructing Efficient Certificateless Public Key Encryption with Pairing
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic ser...
Yijuan Shi, Jianhua Li, Jianjun Shi
AOSE
2004
Springer
14 years 3 months ago
An Agent Construction Model for Ubiquitous Computing Devices
Abstract. One of the main challenges for the successful application of agentbased systems in mobile and embedded devices is enabling application developers to reconcile the needs o...
Ronald Ashri, Michael Luck
JAT
2006
82views more  JAT 2006»
13 years 9 months ago
Construction of recurrent bivariate fractal interpolation surfaces and computation of their box-counting dimension
Recurrent bivariate fractal interpolation surfaces (RBFISs) generalise the notion of affine fractal interpolation surfaces (FISs) in that the iterated system of transformations us...
P. Bouboulis, Leoni Dalla, V. Drakopoulos
ACS
2008
13 years 10 months ago
Fundamental Constructions for Coalgebras, Corings, and Comodules
We study the various categories of corings, coalgebras, and comodules from a categorical perspective. Emphesis is given to the question which properties of these categories can be...
Hans-E. Porst
HICSS
2000
IEEE
135views Biometrics» more  HICSS 2000»
14 years 2 months ago
The IT Performance Evaluation in the Construction Industry
To date there has been limited published work in the construction management and engineering literature that has provided empirical evidence to demonstrate that IT can improve org...
Heng Li, Zahir Irani, Peter E. D. Love