Sciweavers

631 search results - page 51 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
CCE
2004
15 years 1 months ago
pH-neutralization: integrated process and control design
The paper addresses control related design issues for neutralization plants. Mainly for control reasons, the neutralization is usually performed in several steps (mixing tanks) wi...
Audun Faanes, Sigurd Skogestad
ACISP
2006
Springer
15 years 5 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
PODS
2011
ACM
201views Database» more  PODS 2011»
14 years 4 months ago
Data exchange beyond complete data
In the traditional data exchange setting, source instances are restricted to be complete in the sense that every fact is either true or false in these instances. Although natural ...
Marcelo Arenas, Jorge Pérez, Juan L. Reutte...

Book
9855views
17 years 2 months ago
Div, Grad, Curl, and All That: An Informal Text on Vector Calculus
When I started reading about level set methods, I realized that I must have strong mathematical background in several math areas such as differential geometry, vector calculus, par...
H. M. Schey
CVPR
2006
IEEE
15 years 7 months ago
A Shape Representation for Planar Curves by Shape Signature Harmonic Embedding
This paper introduces a new representation for planar curves. From the well-known Dirichlet problem for a disk, the harmonic function embedded in a circular disk is solely depende...
Sang-Mook Lee, A. Lynn Abbott, Neil A. Clark, Phil...