Sciweavers

20831 search results - page 201 / 4167
» Quantum Computation and Information
Sort
View
ECIR
2009
Springer
14 years 6 months ago
Information Extraction and Linking in a Retrieval Context
Marie-Francine Moens, Djoerd Hiemstra
COMPSAC
2006
IEEE
14 years 3 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
CHES
2003
Springer
145views Cryptology» more  CHES 2003»
14 years 2 months ago
Cryptanalysis of DES Implemented on Computers with Cache
This paper presents the results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay...
Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Mak...
CDC
2009
IEEE
113views Control Systems» more  CDC 2009»
14 years 1 months ago
Computation of safety control for uncertain piecewise continuous systems on a partial order
— In this paper, the safety control problem for a class of hybrid systems with disturbance inputs and imperfect continuous state information is considered. Under the assumption t...
Michael R. Hafner, Domitilla Del Vecchio
CAISE
2005
Springer
14 years 2 months ago
Computing the Relevant Instances That May Violate an OCL Constraint
Integrity checking is aimed at efficiently determining whether the state of the information base is consistent after the application of a set of structural events. One possible way...
Jordi Cabot, Ernest Teniente