Sciweavers

3928 search results - page 164 / 786
» order 2006
Sort
View
113
Voted
IJNSEC
2006
69views more  IJNSEC 2006»
15 years 4 months ago
Active Trial-and-error Attack on SASC Protocols
SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) witho...
Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Y...
IJOE
2006
75views more  IJOE 2006»
15 years 4 months ago
Comparison of Intensive and Extensive Sensor Networking Technologies
The objective of this paper is to emphasize a clear and natural distinction in strategies of sensor network design. In order to display different architectural paradigms in today&#...
Marek Miskowicz
INFORMATICALT
2006
96views more  INFORMATICALT 2006»
15 years 4 months ago
Evaluation of Ranking Accuracy in Multi-Criteria Decisions
The paper analyses the problem of ranking accuracy in multiple criteria decision-making (MCDM) methods. The methodology for measuring the accuracy of determining the relative signi...
Edmundas Kazimieras Zavadskas, Algimantas Zakarevi...
INFSOF
2006
151views more  INFSOF 2006»
15 years 4 months ago
Prioritized interaction testing for pair-wise coverage with seeding and constraints
Interaction testing is widely used in screening for faults. In software testing, it provides a natural mechanism for testing systems to be deployed on a variety of hardware and so...
Renée C. Bryce, Charles J. Colbourn
IPM
2006
107views more  IPM 2006»
15 years 4 months ago
Best entry points for structured document retrieval - Part II: Types, usage and effectiveness
Structured document retrieval makes use of document components as the basis of the retrieval process, rather than complete documents. The inherent relationships between these comp...
Jane Reid, Mounia Lalmas, Karen Finesilver, Morten...