Sciweavers

CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 8 months ago
Adversary lower bounds for nonadaptive quantum algorithms
We present two general methods for proving lower bounds on the query complexity of nonadaptive quantum algorithms. Both methods are based on the adversary method of Ambainis. We sh...
Pascal Koiran, Jürgen Landes, Natacha Portier...
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 8 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 8 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 8 months ago
The quest for rings on bipolar scales
Michel Grabisch, Bernard De Baets, János C....
CORR
2008
Springer
97views Education» more  CORR 2008»
13 years 8 months ago
Spreading Signals in the Wideband Limit
Abstract-- Wideband communications are asymptotically impossible with signals that are spread over a very wide band and are transmitted over a multipath channel unknown ahead of ti...
Elchanan Zwecher, Dana Porrat
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 8 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong
CORR
2008
Springer
187views Education» more  CORR 2008»
13 years 8 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
CORR
2008
Springer
69views Education» more  CORR 2008»
13 years 8 months ago
Hash Property and Fixed-rate Universal Coding Theorems
Jun Muramatsu, Shigeki Miyake
CORR
2010
Springer
170views Education» more  CORR 2010»
13 years 8 months ago
Rule-based Generation of Diff Evolution Mappings between Ontology Versions
Ontologies such as taxonomies, product catalogs or web directories are heavily used and hence evolve frequently to meet new requirements or to better reflect the current instance d...
Michael Hartung, Anika Gross, Erhard Rahm
CORR
2008
Springer
71views Education» more  CORR 2008»
13 years 8 months ago
A Survey of Quantum Programming Languages: History, Methods, and Tools
Quantum computer programming is emerging as a new subject domain from multidisciplinary research in quantum computing, computer science, mathematics (especially quantum logic, lamb...
Donald A. Sofge