Sciweavers

3709 search results - page 131 / 742
» Supporting experimentation with Side-Views
Sort
View
ISNN
2005
Springer
14 years 2 months ago
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
Abstract. In ISNN’04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the secur...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
IAW
2003
IEEE
14 years 2 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
SIGECOM
2003
ACM
92views ECommerce» more  SIGECOM 2003»
14 years 2 months ago
Multi-attribute exchange market: representation and indexing of orders
We present an automated exchange for trading complex goods, such as used cars, which allows traders to describe desirable purchases and sales by multiple attributes. The developed...
Eugene Fink, Josh Johnson, John Hershberger 0002
ECAL
1999
Springer
14 years 1 months ago
Modelling the Evolution of Linguistic Diversity
Some recent Artificial Life models have attempted to explain the origin of linguistic diversity with varying conclusions and explanations. We posit, contrary to some existing Artif...
Daniel Livingstone, Colin Fyfe
ANSS
2004
IEEE
14 years 23 days ago
A Service Scheduler in a Trustworthy System
The aim of the research is to investigate techniques that support efficient service scheduling algorithms in a service-oriented fault-tolerant real-time distributed system. Techni...
Yinong Chen