Sciweavers

2714 search results - page 504 / 543
» Model comparison with GenericDiff
Sort
View
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 5 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...
CIKM
2009
Springer
14 years 5 months ago
Independent informative subgraph mining for graph information retrieval
In order to enable scalable querying of graph databases, intelligent selection of subgraphs to index is essential. An improved index can reduce response times for graph queries si...
Bingjun Sun, Prasenjit Mitra, C. Lee Giles
EUROSSC
2009
Springer
14 years 5 months ago
Semantic Rules for Context-Aware Geographical Information Retrieval
Geographical information retrieval (GIR) can benefit from context information to adapt the results to a user’s current situation and personal preferences. In this respect, seman...
Carsten Keßler, Martin Raubal, Christoph Wos...
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
14 years 5 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
MOBICOM
2009
ACM
14 years 4 months ago
Scheduling partition for order optimal capacity in large-scale wireless networks
The capacity scaling property specifies the changes in network throughput when network size increases and serves as an essential performance evaluation metric for large-scale wir...
Yi Xu, Wenye Wang