Sciweavers

10539 search results - page 2030 / 2108
» On L
Sort
View
IJNSEC
2006
134views more  IJNSEC 2006»
13 years 7 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
JC
2008
53views more  JC 2008»
13 years 7 months ago
Relative widths of smooth functions determined by fractional order derivatives
For two subsets W and V of a normed space X. The relative Kolmogorov n-width of W relative to V in X is defined by Kn(W, V )X := inf Ln sup f W inf gV Ln f - g X, where the infimu...
Liu Yongping, Yang Lianhong
CORR
2007
Springer
89views Education» more  CORR 2007»
13 years 7 months ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
CORR
2007
Springer
173views Education» more  CORR 2007»
13 years 7 months ago
Computing modular polynomials in quasi-linear time
We analyse and compare the complexity of several algorithms for computing modular polynomials. We show that an algorithm relying on floating point evaluation of modular functions...
Andreas Enge
CORR
2007
Springer
77views Education» more  CORR 2007»
13 years 7 months ago
The Multiobjective Optimization of a Prismatic Drive
The multiobjective optimization of Slide-o-Cam is reported in this paper. Slide-o-Cam is a cam mechanism with multiple rollers mounted on a common translating follower. This trans...
Emilie Bouyer, Stéphane Caro, Damien Chabla...
« Prev « First page 2030 / 2108 Last » Next »