Sciweavers

58 search results - page 10 / 12
» Secure Information Flow via Linear Continuations
Sort
View
AC
2000
Springer
13 years 5 months ago
State of the art in electronic payment systems
nvented abstract representations of value. As time passed, representations of value became more abstract, progressing from barter through bank notes, payment orders, checks, credit...
N. Asokan, Philippe A. Janson, Michael Steiner, Mi...
SECURWARE
2008
IEEE
14 years 6 days ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...
ICON
2007
IEEE
14 years 4 days ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
EUROISI
2008
13 years 7 months ago
Buzz Monitoring in Word Space
This paper discusses the task of tracking mentions of some topically interesting textual entity from a continuously and dynamically changing flow of text, such as a news feed, the ...
Magnus Sahlgren, Jussi Karlgren
IDA
1999
Springer
13 years 10 months ago
3D Grand Tour for Multidimensional Data and Clusters
Grand tour is a method for viewing multidimensional data via linear projections onto a sequence of two dimensional subspaces and then moving continuously from one projection to the...
Li Yang