Sciweavers

6047 search results - page 1166 / 1210
» Modeling with Extend
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 7 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
E4MAS
2005
Springer
15 years 7 months ago
A Survey of Environments and Mechanisms for Human-Human Stigmergy
Stigmergy (the coordination of agents through signs they make and sense in a shared environment) was originally articulated in the study of social insects. Its basic processes are ...
H. Van Dyke Parunak
ECOOP
2005
Springer
15 years 7 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
ECWEB
2005
Springer
121views ECommerce» more  ECWEB 2005»
15 years 7 months ago
Fuzzy Virtual Card Agent for Customizing Divisible Card Payments
: E-commerce customers may have a problem when paying for the purchase of a major item, if its price is larger than the available credit on their credit card. In the brick and mort...
Soon Ae Chun, Yoo Jung An, James Geller, Sunju Par...
ESA
2005
Springer
107views Algorithms» more  ESA 2005»
15 years 7 months ago
Workload-Optimal Histograms on Streams
Histograms are used in many ways in conventional databases and in data stream processing for summarizing massive data distributions. Previous work on constructing histograms on da...
S. Muthukrishnan, Martin Strauss, X. Zheng
« Prev « First page 1166 / 1210 Last » Next »