Sciweavers

402 search results - page 71 / 81
» Cryptosystems using Linear Groups
Sort
View
COR
2006
99views more  COR 2006»
14 years 10 months ago
Artificial neural networks and multicriterion analysis for sustainable irrigation planning
The objective of the present paper is to select the best compromise irrigation planning strategy for the case study of Jayakwadi irrigation project, Maharashtra, India. Four-phase...
K. Srinivasa Raju, D. Nagesh Kumar, Lucien Duckste...
CORR
2007
Springer
74views Education» more  CORR 2007»
14 years 10 months ago
Packaging of RF Mems Switching Functions on Alumina Substrate
The expending development of wireless communication requires strong demands for components with improved capabilities. RF MEMS devices offer a variable alternative to conventional...
M.-K. El Khatib, Arnaud Pothier, Pierre Blondy
CORR
2002
Springer
133views Education» more  CORR 2002»
14 years 9 months ago
Complete Axiomatizations for Reasoning About Knowledge and Time
Sound and complete axiomatizations are provided for a number of different logics involving modalities for knowledge and time. These logics arise from different choices for various ...
Joseph Y. Halpern, Ron van der Meyden, Moshe Y. Va...
WWW
2004
ACM
15 years 10 months ago
Efficient web change monitoring with page digest
The Internet and the World Wide Web have enabled a publishing explosion of useful online information, which has produced the unfortunate side effect of information overload: it is...
David Buttler, Daniel Rocco, Ling Liu
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 1 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters