Sciweavers

3618 search results - page 554 / 724
» Additive functions for number systems in function fields
Sort
View
MSN
2007
Springer
192views Sensor Networks» more  MSN 2007»
15 years 11 months ago
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
140
Voted
SSD
2007
Springer
124views Database» more  SSD 2007»
15 years 10 months ago
Querying Objects Modeled by Arbitrary Probability Distributions
In many modern applications such as biometric identification systems, sensor networks, medical imaging, geology, and multimedia databases, the data objects are not described exact...
Christian Böhm, Peter Kunath, Alexey Pryakhin...
ARITH
2005
IEEE
15 years 10 months ago
Table Lookup Structures for Multiplicative Inverses Modulo 2k
We introduce an inheritance property and related table lookup structures applicable to simplified evaluation of the modular operations “multiplicative inverse”, “discrete l...
David W. Matula, Alex Fit-Florea, Mitchell Aaron T...
ADAEUROPE
2005
Springer
15 years 10 months ago
The Application of Compile-Time Reflection to Software Fault Tolerance Using Ada 95
Transparent system support for software fault tolerance reduces performance in general and precludes application-specific optimizations in particular. In contrast, explicit support...
Patrick Rogers, Andy J. Wellings
DSOM
2005
Springer
15 years 10 months ago
Decentralized Computation of Threshold Crossing Alerts
Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a certain ...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...