Sciweavers

3483 search results - page 530 / 697
» Forward
Sort
View
CSDA
2006
96views more  CSDA 2006»
15 years 4 months ago
Analysis of new variable selection methods for discriminant analysis
Several methods to select variables that are subsequently used in discriminant analysis are proposed and analysed. The aim is to find from among a set of m variables a smaller sub...
Joaquín A. Pacheco, Silvia Casado, Laura N&...
DAM
2006
121views more  DAM 2006»
15 years 4 months ago
Fine-grained forward-secure signature schemes without random oracles
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-...
Jan Camenisch, Maciej Koprowski
ENTCS
2006
173views more  ENTCS 2006»
15 years 4 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
ENTCS
2006
111views more  ENTCS 2006»
15 years 4 months ago
Token-Passing Nets: Call-by-Need for Free
Recently, encodings in interaction nets of the call-by-name and call-by-value strategies of the -calculus have been proposed. The purpose of these encodings was to he gap between ...
François-Régis Sinot
CCR
2007
108views more  CCR 2007»
15 years 3 months ago
Very low-cost internet access using KioskNet
Rural Internet kiosks in developing regions can cost-effectively provide communication and e-governance services to the poorest sections of society. A variety of technical and no...
Shimin Guo, Mohammad Hossein Falaki, Earl A. Olive...