Sciweavers

3709 search results - page 131 / 742
» Supporting experimentation with Side-Views
Sort
View
120
Voted
ISNN
2005
Springer
15 years 9 months ago
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
Abstract. In ISNN’04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the secur...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
119
Voted
IAW
2003
IEEE
15 years 9 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
108
Voted
SIGECOM
2003
ACM
92views ECommerce» more  SIGECOM 2003»
15 years 9 months ago
Multi-attribute exchange market: representation and indexing of orders
We present an automated exchange for trading complex goods, such as used cars, which allows traders to describe desirable purchases and sales by multiple attributes. The developed...
Eugene Fink, Josh Johnson, John Hershberger 0002
119
Voted
ECAL
1999
Springer
15 years 8 months ago
Modelling the Evolution of Linguistic Diversity
Some recent Artificial Life models have attempted to explain the origin of linguistic diversity with varying conclusions and explanations. We posit, contrary to some existing Artif...
Daniel Livingstone, Colin Fyfe
117
Voted
ANSS
2004
IEEE
15 years 7 months ago
A Service Scheduler in a Trustworthy System
The aim of the research is to investigate techniques that support efficient service scheduling algorithms in a service-oriented fault-tolerant real-time distributed system. Techni...
Yinong Chen