Sciweavers

681 search results - page 82 / 137
» et 2006
Sort
View
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
14 years 9 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
AMC
2006
79views more  AMC 2006»
14 years 9 months ago
VC-dimension and structural risk minimization for the analysis of nonlinear ecological models
The problem of distinguishing density-independent (DI) from density-dependent (DD) demographic time series is important for understanding the mechanisms that regulate populations ...
Giorgio Corani, Marino Gatto
73
Voted
CANDC
2006
ACM
14 years 9 months ago
A comment on "Prediction of protein structural classes by a new measure of information discrepancy"
Protein structural class describes the overall folding type of a protein or its domain. A number of methods were developed to predict protein structural class based on its primary...
Kanaka Durga Kedarisetti, Lukasz A. Kurgan, Scott ...
COMCOM
2006
99views more  COMCOM 2006»
14 years 9 months ago
The PFTK-model revised
This paper presents an analytical model of TCP Reno throughput as a function of loss event rate, average round trip time, average retransmission timeout value, and receiver window...
Roman Dunaytsev, Yevgeni Koucheryavy, Jarmo Harju
COMPSEC
2006
98views more  COMPSEC 2006»
14 years 9 months ago
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user's login process. Recently, Yang et al., proposed an eff...
Kumar V. Mangipudi, Rajendra S. Katti