Sciweavers

4397 search results - page 600 / 880
» Relational Algebra Operations
Sort
View
IJET
2008
86views more  IJET 2008»
15 years 4 months ago
A Delivery Engine for QTI Assessments
The IMS Question and Test Interoperability (QTI) standard has had a restricted take-up, in part due to the lack of tools. This paper describes the `ASDEL' test delivery engine...
Gary B. Wills, Jonathon S. Hare, Jiri Kajaba, Davi...
IJNSEC
2008
110views more  IJNSEC 2008»
15 years 4 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
IJNSEC
2008
143views more  IJNSEC 2008»
15 years 4 months ago
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo's scheme is vulnerable to ...
Da-Zhi Sun, Zhen-Fu Cao
CCE
2007
15 years 4 months ago
Techno-economic modelling and cost functions of CO2 capture processes
The paper contributes to techno-economic modelling of CO2 capture process in coalfired power plants. Technological options of CO2 capture have been chosen and cost estimation rela...
Jiri Klemes, Igor Bulatov, Tim Cockerill
INFORMATICALT
2006
154views more  INFORMATICALT 2006»
15 years 4 months ago
Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors
Matrix transpose in parallel systems typically involves costly all-to-all communications. In this paper, we provide a comparative characterization of various efficient algorithms f...
Rami Al Na'mneh, W. David Pan, Seong-Moo Yoo