Sciweavers

2165 search results - page 28 / 433
» cases 2005
Sort
View
ECCC
2008
98views more  ECCC 2008»
13 years 8 months ago
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
We construct public-key cryptosystems that are secure assuming the worst-case hardness of approximating the minimum distance on n-dimensional lattices to within small poly(n) fact...
Chris Peikert
ADHOC
2005
134views more  ADHOC 2005»
13 years 8 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
AICOM
2005
165views more  AICOM 2005»
13 years 8 months ago
Integration of hospital data using agent technologies - A case study
Data retrieval and its integration is one of the major problems that face large and complex health organizations. This is especially relevant when patient information is produced i...
Ricardo João Cruz Correia, Pedro Manuel Vie...
AIR
2005
97views more  AIR 2005»
13 years 8 months ago
Explanation in Case-Based Reasoning-Perspectives and Goals
Abstract. We present an overview of different theories of explanation from the philosophy and cognitive science communities. Based on these theories, as well as models of explanati...
Frode Sørmo, Jörg Cassens, Agnar Aamod...
APAL
2005
93views more  APAL 2005»
13 years 8 months ago
Logical aspects of Cayley-graphs: the group case
Abstract. We prove that a finitely generated group is context-free whenever its Cayleygraph has a decidable monadic second-order theory. Hence, by the seminal work of Muller and Sc...
Dietrich Kuske, Markus Lohrey