Sciweavers

5799 search results - page 1126 / 1160
» Position Paper
Sort
View
CORR
2007
Springer
127views Education» more  CORR 2007»
14 years 12 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
IJVR
2006
142views more  IJVR 2006»
14 years 12 months ago
Garden Alive: an Emotionally Intelligent Interactive Garden
In this paper, we introduce the "Garden Alive" system that allows users to interact with an emotionally intelligent virtual garden by manipulating tangible user interface...
Taejin Ha, Woontack Woo
JMLR
2008
127views more  JMLR 2008»
14 years 12 months ago
Incremental Identification of Qualitative Models of Biological Systems using Inductive Logic Programming
The use of computational models is increasingly expected to play an important role in predicting the behaviour of biological systems. Models are being sought at different scales o...
Ashwin Srinivasan, Ross D. King
JCO
2006
106views more  JCO 2006»
14 years 12 months ago
Reliable Ad Hoc Routing Based on Mobility Prediction
Reliability is a very important issue in Mobile Ad hoc NETworks (MANETs). Shortest paths are usually used to route packets in MANETs. However, a shortest path may fail quickly, bec...
Jian Tang, Guoliang Xue, Weiyi Zhang
JSW
2008
196views more  JSW 2008»
14 years 12 months ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih
« Prev « First page 1126 / 1160 Last » Next »