Sciweavers

2143 search results - page 357 / 429
» corr 2010
Sort
View
118
Voted
CORR
2010
Springer
159views Education» more  CORR 2010»
15 years 22 days ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
109
Voted
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 22 days ago
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma
CORR
2010
Springer
129views Education» more  CORR 2010»
15 years 22 days ago
Attribute oriented induction with star schema
: This paper will propose a novel star schema attribute induction as a new attribute induction paradigm and as improving from current attribute oriented induction. A novel star sch...
Spits Warnars H. L. H
CORR
2010
Springer
195views Education» more  CORR 2010»
15 years 22 days ago
Dynamic management of transactions in distributed real-time processing system
Managing the transactions in real time distributed computing system is not easy, as it has heterogeneously networked computers to solve a single problem. If a transaction runs acr...
Y. Jayanta Singh, Yumnam Somananda Singh, Ashok Ga...
91
Voted
CORR
2010
Springer
156views Education» more  CORR 2010»
15 years 22 days ago
Modelling Reactive and Proactive Behaviour in Simulation
: This research investigated the simulation model behaviour of a traditional and combined discrete event as well as agent based simulation models when modelling human reactive and ...
Mazlina Abdul Majid, Peer-Olaf Siebers, Uwe Aickel...