Sciweavers

2340 search results - page 90 / 468
» Second quarter 2008
Sort
View
SYNTHESE
2008
71views more  SYNTHESE 2008»
14 years 11 months ago
Categories for the working mathematician: making the impossible possible
This paper discusses the notion of necessity in the light of results from contemporary mathematical practice. Two descriptions of necessity are considered. According to the first, ...
Jessica Carter
IJSN
2007
94views more  IJSN 2007»
14 years 11 months ago
On security proof of McCullagh?Barreto's key agreement protocol and its variants
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Zhaohui Cheng, Liqun Chen
IJSNET
2007
98views more  IJSNET 2007»
14 years 11 months ago
Supporting mobile device communications in the presence of broadcast servers
Abstract: Broadcast data dissemination is well-suited for mobile wireless environments, where bandwidth is scarce, and mutual interference must be minimized. However, broadcasting ...
Anup Mayank, Chinya V. Ravishankar
TASLP
2008
102views more  TASLP 2008»
14 years 11 months ago
Computational Models of Similarity for Drum Samples
In this paper, we optimize and evaluate computational models of similarity for sounds from the same instrument class. We investigate four instrument classes: bass drums, snare drum...
Elias Pampalk, Perfecto Herrera, Masataka Goto
TCS
2008
14 years 11 months ago
Making the use of maximal ideals constructive
The purpose of this paper is to decipher constructively a lemma of Suslin which played a central role in his second solution of Serre's problem on projective modules over pol...
Ihsen Yengui