Sciweavers

20175 search results - page 24 / 4035
» Is abstraction the key to computing
Sort
View
IJACT
2010
103views more  IJACT 2010»
14 years 7 months ago
On reusing ephemeral keys in Diffie-Hellman key agreement protocols
A party may choose to reuse ephemeral public keys in a Diffie-Hellman key agreement protocol in order to reduce its computational workload or to mitigate against denial-of-service ...
Alfred Menezes, Berkant Ustaoglu
UMC
2000
15 years 4 months ago
Upper and Lower Bounds on Continuous-Time Computation
Abstract. We consider various extensions and modifications of Shannon's General Purpose Analog Computer, which is a model of computation by differential equations in continuou...
Manuel Lameiras Campagnolo, Cristopher Moore
ICWN
2008
15 years 1 months ago
Heterogeneity in Mobile Computing Environmens
The rapid evolution of mobile computing has spawned a very heterogeneous spectrum of technologies affecting both devices and system in the mobile computing domain. Since mobile com...
Robert Schmohl, Uwe Baumgarten
INFORMATICALT
2000
79views more  INFORMATICALT 2000»
15 years 8 days ago
Influence of Projection Pursuit on Classification Errors: Computer Simulation Results
Abstract. Influence of projection pursuit on classification errors and estimates of a posteriori probabilities from the sample is considered. Observed random variable is supposed t...
Gintautas Jakimauskas, Ricardas Krikstolaitis