Sciweavers

4397 search results - page 729 / 880
» Relational Algebra Operations
Sort
View
CORR
2010
Springer
114views Education» more  CORR 2010»
14 years 11 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 11 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
CORR
2010
Springer
198views Education» more  CORR 2010»
14 years 11 months ago
Space and the Synchronic A-Ram
Space is a spatial programming language designed to exploit the massive parallelism available in a formal model of computation called the Synchronic A-Ram, and physically related ...
Alexander Victor Berka
CORR
2008
Springer
100views Education» more  CORR 2008»
14 years 11 months ago
Graph-Based Classification of Self-Dual Additive Codes over Finite Fields
Quantum stabilizer states over Fm can be represented as self-dual additive codes over Fm2 . These codes can be represented as weighted graphs, and orbits of graphs under the genera...
Lars Eirik Danielsen
CORR
2008
Springer
96views Education» more  CORR 2008»
14 years 11 months ago
High Efficiency 3-Phase Cmos Rectifier with Step Up and Regulated
: This paper presents several design issues related to the monolithic integration of a 3-phase AC to DC low voltage, low power rectifier for 3-phase micro source electrical conditi...
J.-C. Crebier, Y. Lembeye, H. Raisigel, O. Deleage...