Sciweavers

6607 search results - page 277 / 1322
» Making TeX Work
Sort
View
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
15 years 10 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway
FSEN
2007
Springer
15 years 10 months ago
Hoare Logic for ARM Machine Code
This paper shows how a machine-code Hoare logic is used to lift reasoning from the tedious operational model of a machine lana manageable level of abstraction without making simpli...
Magnus O. Myreen, Anthony C. J. Fox, Michael J. C....
GECON
2007
Springer
108views Business» more  GECON 2007»
15 years 10 months ago
Strategies for the Service Market Place
We describe a number of strategies for a future service oriented market place. We describe the SLA’s role within the service framework, and how it enables customers to make value...
Paul McKee, Steve Taylor, Mike Surridge, Richard L...
HPCC
2007
Springer
15 years 10 months ago
Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
Qiang Zhang, Guangming Hu, Zhenghu Gong
ICB
2007
Springer
163views Biometrics» more  ICB 2007»
15 years 10 months ago
Palmprint Recognition Based on Directional Features and Graph Matching
Palmprint recognition, as a reliable personal identity check method, has been receiving increasing attention during recent years. According to previous work, local texture analysis...
Yufei Han, Tieniu Tan, Zhenan Sun