Sciweavers

14824 search results - page 2965 / 2965
» Security - Introduction
Sort
View
COCO
2010
Springer
168views Algorithms» more  COCO 2010»
13 years 8 months ago
A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP
We investigate the question of what languages can be decided efficiently with the help of a recursive collisionfinding oracle. Such an oracle can be used to break collisionresistan...
Iftach Haitner, Mohammad Mahmoody, David Xiao
NETWORK
2008
150views more  NETWORK 2008»
13 years 7 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu
SCFBM
2008
131views more  SCFBM 2008»
13 years 6 months ago
FASH: A web application for nucleotides sequence search
: FASH (Fourier Alignment Sequence Heuristics) is a web application, based on the Fast Fourier Transform, for finding remote homologs within a long nucleic acid sequence. Given a ...
Isana Veksler-Lublinsky, Danny Barash, Chai Avisar...
NETGAMES
2006
ACM
14 years 29 days ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...
« Prev « First page 2965 / 2965 Last » Next »