Sciweavers

7064 search results - page 1328 / 1413
» From States to Histories
Sort
View
OTM
2005
Springer
15 years 5 months ago
Selection Using Non-symmetric Context Areas
Abstract. This paper targets with applications running on mobile devices and using context informations. Following previous studies from other authors, we extend the notion of cont...
Diane Lingrand, Stephane Lavirotte, Jean-Yves Tigl...
PKC
2005
Springer
167views Cryptology» more  PKC 2005»
15 years 5 months ago
Converse Results to the Wiener Attack on RSA
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-...
Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef...
SAFECOMP
2005
Springer
15 years 5 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
STACS
2005
Springer
15 years 5 months ago
Kolmogorov-Loveland Randomness and Stochasticity
An infinite binary sequence X is Kolmogorov-Loveland (or KL) random if there is no computable non-monotonic betting strategy that succeeds on X in the sense of having an unbounde...
Wolfgang Merkle, Joseph S. Miller, André Ni...
UM
2005
Springer
15 years 5 months ago
Modeling Individual and Collaborative Problem Solving in Medical Problem-Based Learning
Abstract. Since problem solving in group problem-based learning is a collaborative process, modeling individuals and the group is necessary if we wish to develop an intelligent tut...
Siriwan Suebnukarn, Peter Haddawy
« Prev « First page 1328 / 1413 Last » Next »