Sciweavers

681 search results - page 82 / 137
» et 2006
Sort
View
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
14 years 12 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
AMC
2006
79views more  AMC 2006»
14 years 12 months ago
VC-dimension and structural risk minimization for the analysis of nonlinear ecological models
The problem of distinguishing density-independent (DI) from density-dependent (DD) demographic time series is important for understanding the mechanisms that regulate populations ...
Giorgio Corani, Marino Gatto
CANDC
2006
ACM
14 years 12 months ago
A comment on "Prediction of protein structural classes by a new measure of information discrepancy"
Protein structural class describes the overall folding type of a protein or its domain. A number of methods were developed to predict protein structural class based on its primary...
Kanaka Durga Kedarisetti, Lukasz A. Kurgan, Scott ...
COMCOM
2006
99views more  COMCOM 2006»
14 years 12 months ago
The PFTK-model revised
This paper presents an analytical model of TCP Reno throughput as a function of loss event rate, average round trip time, average retransmission timeout value, and receiver window...
Roman Dunaytsev, Yevgeni Koucheryavy, Jarmo Harju
COMPSEC
2006
98views more  COMPSEC 2006»
14 years 12 months ago
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user's login process. Recently, Yang et al., proposed an eff...
Kumar V. Mangipudi, Rajendra S. Katti