Sciweavers

755 search results - page 4 / 151
» ideas 2005
Sort
View
CRYPTO
2005
Springer
83views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
A Practical Attack on a Braid Group Based Cryptographic Protocol
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehorn...
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander...
ICCSA
2005
Springer
14 years 4 months ago
Evolutionary Algorithm for Congestion Problem in Connection-Oriented Networks
The major objective of this paper is to deploy an effective evolutionary algorithm (EA) for the congestion problem in connection-oriented networks. The network flow is modeled as n...
Michal Przewozniczek, Krzysztof Walkowiak
OTM
2005
Springer
14 years 4 months ago
A Fact-Oriented Approach to Activity Modeling
In this paper we investigate the idea of using an ORM model as a starting point to derive an activity model, essentially providing an activity view on the original ORM model. When ...
Henderik Alex Proper, Stijn Hoppenbrouwers, Theo P...
ITICSE
2005
ACM
14 years 4 months ago
Teaching polymorphism early
Is it possible to teach dynamic polymorphism early? What techniques could facilitate teaching it in Java. This panel will bring together people who have considered this question a...
Joseph Bergin, Eugene Wallingford, Michael E. Casp...
IDEAS
2005
IEEE
103views Database» more  IDEAS 2005»
14 years 4 months ago
Persistent Middle Tier Components Without Logging
Enterprise applications need to be highly available and scalable. In the past, this has required “stateless” applications, which essentially require the application to manage ...
David B. Lomet