Sciweavers

1520 search results - page 195 / 304
» The Ring Loading Problem
Sort
View
ICOIN
2001
Springer
15 years 7 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
DIAGRAMS
2000
Springer
15 years 7 months ago
Capacity Limits in Diagrammatic Reasoning
This paper examines capacity limits in mental animation of static diagrams of mechanical systems and interprets these limits within current theories of working memory. I review emp...
Mary Hegarty
SC
1994
ACM
15 years 7 months ago
A parallel formulation of interior point algorithms
In recent years, interior point algorithms have been used successfully for solving mediumto large-size linear programming LP problems. In this paper we describe a highly parallel ...
George Karypis, Anshul Gupta, Vipin Kumar
143
Voted
CONEXT
2007
ACM
15 years 7 months ago
Scalable real-time gateway assignment in mobile mesh networks
The perception of future wireless mesh network (WMN) deployment and usage is rapidly evolving. WMNs are now being envisaged to provide citywide "last-mile" access for nu...
Edward Bortnikov, Israel Cidon, Idit Keidar
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
15 years 6 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval