Sciweavers

5227 search results - page 1033 / 1046
» Constructing New Media
Sort
View
127
Voted
LATINCRYPT
2010
15 years 6 days ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
LICS
2010
IEEE
15 years 6 days ago
Abstracting the Differential Semantics of Rule-Based Models: Exact and Automated Model Reduction
ing the differential semantics of rule-based models: exact and automated model reduction (Invited Lecture) Vincent Danos∗§, J´erˆome Feret†, Walter Fontana‡, Russell Harme...
Vincent Danos, Jérôme Feret, Walter F...
MA
2010
Springer
94views Communications» more  MA 2010»
15 years 6 days ago
On sparse estimation for semiparametric linear transformation models
: Semiparametric linear transformation models have received much attention due to its high flexibility in modeling survival data. A useful estimating equation procedure was recent...
Hao Helen Zhang, Wenbin Lu, Hansheng Wang
MATES
2010
Springer
15 years 6 days ago
Unifying Agent and Component Concepts: Jadex Active Components
The construction of distributed applications is a challenging task due to inherent system properties like message passing and concurrency. Current technology trends further increas...
Alexander Pokahr, Lars Braubach, Kai Jander
NAS
2010
IEEE
15 years 6 days ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
« Prev « First page 1033 / 1046 Last » Next »