Sciweavers

11752 search results - page 67 / 2351
» Those
Sort
View
SIGIR
2010
ACM
15 years 1 months ago
SIGIR: scholar vs. scholars' interpretation
Google Scholar allows researchers to search through a free and extensive source of information on scientific publications. In this paper we show that within the limited context o...
James Lanagan, Alan F. Smeaton
AINA
2004
IEEE
15 years 1 months ago
An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET)
A secure MANET system, called SMANET, was developed that accepts only those packets whose MAC addresses are in the Linux iptable firewall rules. Detailed iptable set up and the pe...
C. Edward Chow, Paul J. Fong, Ganesh Godavari
59
Voted
FOCS
2004
IEEE
15 years 1 months ago
On the (Im)possibility of Cryptography with Imperfect Randomness
We investigate the feasibility of a variety of cryptographic tasks with imperfect randomness. The kind of imperfect randomness we consider are entropy sources, such as those consi...
Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, ...
FOSSACS
2006
Springer
15 years 1 months ago
Parity Games Played on Transition Graphs of One-Counter Processes
We consider parity games played on special pushdown graphs, namely those generated by one-counter processes. For parity games on pushdown graphs, it is known from [22] that decidin...
Olivier Serre
ATS
2001
IEEE
101views Hardware» more  ATS 2001»
15 years 1 months ago
Framework of Timed Trace Theoretic Verification Revisited
This paper develops a framework to support trace theoretic verification of timed circuits and systems. A theoretical foundation for classifying timed traces as either successes or...
Bin Zhou, Tomohiro Yoneda, Chris J. Myers