Sciweavers

1898 search results - page 51 / 380
» Weak Keys for IDEA
Sort
View
136
Voted
SEC
2004
15 years 5 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis
106
Voted
UAI
1997
15 years 5 months ago
Time-Critical Action: Representations and Application
We review the problem of time-critical action and discuss a reformulation that shifts knowledge acquisition from the assessment of complex temporal probabilistic dependencies to t...
Eric Horvitz, Adam Seiver
148
Voted
CEC
2007
IEEE
15 years 10 months ago
An evolutionary progressive multiple sequence alignment
Abstract This paper presents a new evolutionary method, namely, a Two Phase evolutionary algorithm for multiple sequence alignments. This method is composed of different types of e...
Farhana Naznin, Morikazu Nakamura, Takeo Okazaki, ...
120
Voted
SPIRE
2007
Springer
15 years 9 months ago
Highly Frequent Terms and Sentence Retrieval
In this paper we propose a novel sentence retrieval method based on extracting highly frequent terms from top retrieved documents. We compare it against state of the art sentence r...
David E. Losada, Ronald T. Fernández
90
Voted
HPCC
2005
Springer
15 years 9 months ago
Transactional Cluster Computing
A lot of sophisticated techniques and platforms have been proposed to build distributed object systems. Remote method invocation and explicit message passing on top of traditional...
Stefan Frenz, Michael Schöttner, Ralph Gö...