Sciweavers

1809 search results - page 208 / 362
» Weakly Computable Real Numbers
Sort
View
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 10 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
ICPR
2008
IEEE
14 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
NCA
2007
IEEE
14 years 4 months ago
Impact of request dispatching granularity in geographically distributed Web systems
The advent of the mobile Web and the increasing demand for personalized contents arise the need for computationally expensive services, such as dynamic generation and on-thefly a...
Mauro Andreolini, Claudia Canali, Riccardo Lancell...
COMPGEOM
2004
ACM
14 years 3 months ago
Inner and outer rounding of set operations on lattice polygonal regions
Robustness problems due to the substitution of the exact computation on real numbers by the rounded floating point arithmetic are often an obstacle to obtain practical implementa...
Olivier Devillers, Philippe Guigue
SI3D
2003
ACM
14 years 3 months ago
A general joint component framework for realistic articulation in human characters
We present a general joint component framework model that is capable of exhibiting complex behavior of joints in articulated figures. The joints are capable of handling non-ortho...
Wei Shao, Victor Ng-Thow-Hing