Sciweavers

10289 search results - page 24 / 2058
» Standard bases in K
Sort
View
ICNS
2009
IEEE
14 years 11 months ago
A Standards-Based Alarms Service for Monitoring Federated Networks
Charaka Palansuriya, Jeremy Nowell, Florian Schari...
JOC
2000
130views more  JOC 2000»
15 years 1 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 11 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
ICCS
2003
Springer
15 years 7 months ago
Computational Science Simulations Based on Web Services
Abstract. We describe the software architecture of a system for doing multiphysics simulation of a coupled fluid, thermal, and mechanical fracture problem. The system is organized...
L. Paul Chew, Nikos Chrisochoides, S. Gopalsamy, G...