Sciweavers

9425 search results - page 1608 / 1885
» Some Notes on Models and Modelling
Sort
View
JMM2
2008
84views more  JMM2 2008»
15 years 4 months ago
A Localized and Secure Method for Transferring Bank Information by SMS for Persian Banks
Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services su...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
CSDA
2007
114views more  CSDA 2007»
15 years 4 months ago
Relaxed Lasso
The Lasso is an attractive regularisation method for high dimensional regression. It combines variable selection with an efficient computational procedure. However, the rate of co...
Nicolai Meinshausen
JALC
2006
87views more  JALC 2006»
15 years 4 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
JNW
2008
171views more  JNW 2008»
15 years 4 months ago
The Necessity of Semantic Technologies in Grid Discovery
Service discovery and its automation are some of the key features that a large scale, open distributed system must provide so that clients and users may take advantage of shared re...
Serena Pastore
JAR
2006
81views more  JAR 2006»
15 years 4 months ago
Verifying the SET Purchase Protocols
SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure ecommerce transactions. The Purcha...
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
« Prev « First page 1608 / 1885 Last » Next »