Sciweavers

1898 search results - page 51 / 380
» Weak Keys for IDEA
Sort
View
SEC
2004
13 years 10 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis
UAI
1997
13 years 10 months ago
Time-Critical Action: Representations and Application
We review the problem of time-critical action and discuss a reformulation that shifts knowledge acquisition from the assessment of complex temporal probabilistic dependencies to t...
Eric Horvitz, Adam Seiver
CEC
2007
IEEE
14 years 3 months ago
An evolutionary progressive multiple sequence alignment
Abstract This paper presents a new evolutionary method, namely, a Two Phase evolutionary algorithm for multiple sequence alignments. This method is composed of different types of e...
Farhana Naznin, Morikazu Nakamura, Takeo Okazaki, ...
SPIRE
2007
Springer
14 years 2 months ago
Highly Frequent Terms and Sentence Retrieval
In this paper we propose a novel sentence retrieval method based on extracting highly frequent terms from top retrieved documents. We compare it against state of the art sentence r...
David E. Losada, Ronald T. Fernández
HPCC
2005
Springer
14 years 2 months ago
Transactional Cluster Computing
A lot of sophisticated techniques and platforms have been proposed to build distributed object systems. Remote method invocation and explicit message passing on top of traditional...
Stefan Frenz, Michael Schöttner, Ralph Gö...