Sciweavers

121 search results - page 17 / 25
» random 1997
Sort
View
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
13 years 11 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
WSC
1997
13 years 9 months ago
Applications of Discrete Event Simulation in the Design of Automotive Powertrain Manufacturing Systems
Manufacturing automotive powertrain components (engines and transmissions) is a complex task involving the integration of hundreds of components. Simulation is commonly applied in...
Arun Jayaraman, Ali K. Gunal
COMBINATORICS
2000
114views more  COMBINATORICS 2000»
13 years 7 months ago
Trees and Matchings
In this article, Temperley's bijection between spanning trees of the square grid on the one hand, and perfect matchings (also known as dimer coverings) of the square grid on ...
Richard Kenyon, James Gary Propp, David Bruce Wils...
TON
2010
83views more  TON 2010»
13 years 6 months ago
Understanding and modeling the internet topology: economics and evolution perspective
Abstract—In this paper, we seek to understand the intrinsic reasons for the well-known phenomenon of heavy-tailed degree in the Internet AS graph and argue that in contrast to tr...
Xiaoming Wang, Dmitri Loguinov
WSC
1997
13 years 9 months ago
Selecting the Best System: A Decision-Theoretic Approach
The problem of selecting the best system from a finite set of alternatives is considered from a Bayesian decision-theoretic perspective. The framework presented is quite general,...
Stephen E. Chick