Sciweavers

3104 search results - page 560 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
122
Voted
CORR
2004
Springer
107views Education» more  CORR 2004»
15 years 3 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
SIAMSC
2010
151views more  SIAMSC 2010»
15 years 2 months ago
An Inner-Outer Iteration for Computing PageRank
We present a new iterative scheme for PageRank computation. The algorithm is applied to the linear system formulation of the problem, using inner-outer stationary iterations. It is...
David F. Gleich, Andrew P. Gray, Chen Greif, Tracy...
131
Voted
TMC
2010
161views more  TMC 2010»
15 years 2 months ago
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
—Secret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropp...
Neal Patwari, Jessica Croft, Suman Jana, Sneha Kum...
132
Voted
TSE
2010
125views more  TSE 2010»
15 years 2 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin
150
Voted
KI
2010
Springer
15 years 1 months ago
Local Adaptive Extraction of References
Abstract. The accurate extraction of scholarly reference information from scientific publications is essential for many useful applications like BIBTEX management systems or citati...
Peter Klügl, Andreas Hotho, Frank Puppe