Sciweavers

893 search results - page 40 / 179
» Descent Theory for Schemes
Sort
View
SIGCOMM
1996
ACM
15 years 4 months ago
A Channel Access Scheme for Large Dense Packet Radio Networks
Prior work in the eld of packet radio networks has often assumed a simple success-if-exclusive model of successful reception. This simple model is insucient to model interference...
Timothy J. Shepard
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 3 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
AAAI
2006
15 years 1 months ago
Proposing a New Term Weighting Scheme for Text Categorization
In text categorization, term weighting methods assign appropriate weights to the terms to improve the classification performance. In this study, we propose an effective term weigh...
Man Lan, Chew Lim Tan, Hwee-Boon Low
CORR
2010
Springer
60views Education» more  CORR 2010»
14 years 12 months ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
DCC
1999
IEEE
14 years 11 months ago
Designs in Product Association Schemes
Recently, P.J. Cameron studied a class of block designs which generalises the classes of t-designs, -resolved 2-designs, orthogonal arrays, and other classes of combinatorial desi...
William J. Martin