Sciweavers

951 search results - page 77 / 191
» Suggestions for OWL 3
Sort
View
CRYPTO
1993
Springer
168views Cryptology» more  CRYPTO 1993»
15 years 1 months ago
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a differential attack, and a linear att...
Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan...
APWEB
2006
Springer
15 years 1 months ago
HVEM Grid: Experiences in Constructing an Electron Microscopy Grid
This paper proposes HVEM-Grid, which is the cornerstone for tele-instrumentation infrastructure. The proposed architecture is mainly oriented for people whose primary work is to ge...
Hyuck Han, Hyungsoo Jung, Heon Young Yeom, Hee S. ...
CSCW
2006
ACM
15 years 1 months ago
An exploratory analysis of partner action and camera control in a video-mediated collaborative task
This paper reports on an exploratory experimental study of the relationships between physical movement and desired visual information in the performance of video-mediated collabor...
Abhishek Ranjan, Jeremy P. Birnholtz, Ravin Balakr...
WSC
2007
15 years 5 days ago
Non-Gaussian asset allocation in the federal thrift savings plan
Historical data suggest that returns of stocks and indices are not distributed independent and identically Normal, as is commonly assumed. Instead, returns of financial assets are...
Scott T. Nestler
CAISE
2008
Springer
14 years 12 months ago
Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems
A recent trend in Ubiquitous Computing is that embedded software (e.g. in production machines, wired or wireless networked sensors and actuators, or RFID readers) directly offers W...
Patrik Spieß, Dinh Khoa Nguyen, Ingo Weber, ...