Sciweavers

1341 search results - page 241 / 269
» Periods in Extensions of Words
Sort
View
RFIDSEC
2010
13 years 6 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
SCP
2010
155views more  SCP 2010»
13 years 6 months ago
Type inference and strong static type checking for Promela
The SPIN model checker and its specification language Promela have been used extensively in industry and academia to check logical properties of distributed algorithms and protoc...
Alastair F. Donaldson, Simon J. Gay
BMCBI
2011
13 years 2 months ago
Properties of Metabolic Graphs: Biological Organization or Representation Artifacts?
Background: Standard graphs, where each edge links two nodes, have been extensively used to represent the connectivity of metabolic networks. It is based on this representation th...
Wanding Zhou, Luay Nakhleh
CORR
2010
Springer
232views Education» more  CORR 2010»
13 years 7 months ago
MiBoard: Multiplayer Interactive Board Game
Serious games have recently emerged as an avenue for curriculum delivery. Serious games incorporate motivation and entertainment while providing pointed curriculum for the user. Th...
Kyle B. Dempsey, Justin F. Brunelle, G. Tanner Jac...
ICDE
2008
IEEE
167views Database» more  ICDE 2008»
14 years 9 months ago
Automatic Extraction of Useful Facet Hierarchies from Text Databases
Databases of text and text-annotated data constitute a significant fraction of the information available in electronic form. Searching and browsing are the typical ways that users ...
Wisam Dakka, Panagiotis G. Ipeirotis