Sciweavers

681 search results - page 40 / 137
» et 2006
Sort
View
75
Voted
IJNSEC
2006
71views more  IJNSEC 2006»
14 years 9 months ago
Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
Zhong et al. formulated the problem of disclosing credentials (associated with privacy) for building trust in an open environment like Internet. Thus, one form of privacy-trust pr...
Rama Murthy Garimella
LOBJET
2006
105views more  LOBJET 2006»
14 years 9 months ago
Expression and Composition of Design Patterns with AspectJ
ABSTRACT. Design patterns are well-known couples of problems-solutions for software engineering. By nature, they often lack support from languages and this further complicates the ...
Simon Denier, Pierre Cointe
ACL
2007
14 years 11 months ago
Multilingual Transliteration Using Feature based Phonetic Method
In this paper we investigate named entity transliteration based on a phonetic scoring method. The phonetic method is computed using phonetic features and carefully designed pseudo...
Su-Youn Yoon, Kyoung-Young Kim, Richard Sproat
IPL
2006
80views more  IPL 2006»
14 years 9 months ago
BubbleSearch: A simple heuristic for improving priority-based greedy algorithms
We introduce BubbleSearch, a general approach for extending priority-based greedy heuristics. Following the framework recently developed by Borodin et al., we consider priority al...
Neal Lesh, Michael Mitzenmacher
80
Voted
IJNSEC
2006
110views more  IJNSEC 2006»
14 years 9 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo