Sciweavers

5726 search results - page 1064 / 1146
» Supporting annotations on relations
Sort
View
ASIACRYPT
2005
Springer
14 years 2 months ago
Adapting Density Attacks to Low-Weight Knapsacks
Cryptosystems based on the knapsack problem were among the first public-key systems to be invented. Their high encryption/decryption rate attracted considerable interest until it ...
Phong Q. Nguyen, Jacques Stern
ERCIMDL
2005
Springer
80views Education» more  ERCIMDL 2005»
14 years 2 months ago
Strategies for Reprocessing Aggregated Metadata
The OAI protocol facilitates the aggregation of large numbers of heterogeneous metadata records. In order to make harvested records useable in the context of an OAI service provide...
Muriel Foulonneau, Timothy W. Cole
MSN
2005
Springer
14 years 2 months ago
Using MDS Codes for the Key Establishment of Wireless Sensor Networks
Key pre-distribution techniques for security provision of Wireless Sensor Networks (WSNs) have attracted significant interests recently. In these schemes, a relatively small numbe...
Jing Deng, Yunghsiang S. Han
NOSSDAV
2005
Springer
14 years 2 months ago
Real-time monitoring of video quality in IP networks
This paper investigates the problem of assessing the quality of video transmitted over IP networks. Our goal is to develop a methodology that is both reasonably accurate and simpl...
Shu Tao, John G. Apostolopoulos, Roch Guéri...
OOPSLA
2005
Springer
14 years 2 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
« Prev « First page 1064 / 1146 Last » Next »