Sciweavers

7811 search results - page 224 / 1563
» computer 2004
Sort
View
143
Voted
ISSAC
2004
Springer
94views Mathematics» more  ISSAC 2004»
15 years 10 months ago
Algorithms for polynomial GCD computation over algebraic function fields
Let L be an algebraic function field in k ≥ 0 parameters t1, . . . , tk. Let f1, f2 be non-zero polynomials in L[x]. We give two algorithms for computing their gcd. The first,...
Mark van Hoeij, Michael B. Monagan
ISW
2004
Springer
15 years 10 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate
160
Voted
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
15 years 10 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
172
Voted
SG
2004
Springer
15 years 10 months ago
Implementation of ActiveCube as an Intuitive 3D Computer Interface
This paper describes in details the implementation of the ActiveCube system. ActiveCube allows users to construct and interact with 3D environments by using physical cubes as bi-di...
Ryoichi Watanabe, Yuichi Itoh, Michihiro Kawai, Yo...
AIPS
2004
15 years 6 months ago
Incremental Maximum Flows for Fast Envelope Computation
Resource envelopes provide the tightest exact bounds on the resource consumption and production caused by all possible executions of a temporally flexible plan. We present a new c...
Nicola Muscettola