Sciweavers

1227 search results - page 62 / 246
» Remote Store Programming
Sort
View
GI
2001
Springer
14 years 1 months ago
A Simple Key Distribution Method for IEEE 802.11 Encryption Keys
This article proposes a simple key management protocol for the distribution of shared session keys in IEEE 802.11 wireless LANs. For this purpose an individual key for each user i...
Günter Schäfer, Michael Eyrich
AISC
2008
Springer
13 years 10 months ago
Symbolic Computation Software Composability
We present three examples of the composition of Computer Algebra Systems to illustrate the progress on a composability infrastructure as part of the SCIEnce (Symbolic Computation I...
Sebastian Freundt, Peter Horn, Alexander Konovalov...
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 10 months ago
Detecting Cheats In Online Student Assessments Using Data Mining
: We can find several online assessment applications, Windows oriented or Web based, licensed or gnu free software, proprietary or standardized. All of them executing basic questio...
Genadiy Burlak, Jaime Muñoz, Alberto Ochoa,...
P2PKM
2004
13 years 10 months ago
Coordinating Mobile Databases
Abstract. We are interested in the development of a database management layer which is completely portable and, therefore, "pluggable" on top of multiple host platforms. ...
Fausto Giunchiglia, Ilya Zaihrayeu
CAV
2005
Springer
106views Hardware» more  CAV 2005»
14 years 2 months ago
Incremental Algorithms for Inter-procedural Analysis of Safety Properties
Automaton-based static program analysis has proved to be an effective tool for bug finding. Current tools generally re-analyze a program from scratch in response to a change in t...
Christopher L. Conway, Kedar S. Namjoshi, Dennis D...