This paper discusses the notion of necessity in the light of results from contemporary mathematical practice. Two descriptions of necessity are considered. According to the first, ...
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Abstract: Broadcast data dissemination is well-suited for mobile wireless environments, where bandwidth is scarce, and mutual interference must be minimized. However, broadcasting ...
In this paper, we optimize and evaluate computational models of similarity for sounds from the same instrument class. We investigate four instrument classes: bass drums, snare drum...
The purpose of this paper is to decipher constructively a lemma of Suslin which played a central role in his second solution of Serre's problem on projective modules over pol...