Sciweavers

974 search results - page 63 / 195
» pairing 2010
Sort
View
COLING
2010
13 years 5 months ago
Argument Optionality in the LinGO Grammar Matrix
We present a library of implemented HPSG analyses for argument optionality based on typological studies of this phenomenon in the world's languages, developed in the context ...
Safiyyah Saleem, Emily M. Bender
TIM
2010
75views Education» more  TIM 2010»
13 years 4 months ago
Modeling the Series Impedance of a Quad Cable for Common-Mode DSL Applications
New digital subscriber line (DSL) technologies are being developed to meet the ever-increasing bandwidth demand of the user. One very promising approach injects "common-mode&q...
Wim Foubert, Carine Neus, Leo Van Biesen, Yves Rol...
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
JOCN
2010
99views more  JOCN 2010»
13 years 8 months ago
"Virus and Epidemic": Causal Knowledge Activates Prediction Error Circuitry
■ Knowledge about cause and effect relationships (e.g., virus– epidemic) is essential for predicting changes in the environment and for anticipating the consequences of events...
Daniela B. Fenker, Mircea Ariel Schoenfeld, Michae...