Sciweavers

340 search results - page 42 / 68
» ets 2009
Sort
View
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
15 years 6 months ago
Information Sharing at National Borders: Extending the Utility of Border Theory
Research has identified the potential and challenges of information sharing in government settings mostly within the context of a single country. The challenges facing inter-gover...
Celene Navarrete, Sehl Mellouli, Theresa A. Pardo,...
ICDCS
2009
IEEE
15 years 6 months ago
Stochastic Multicast with Network Coding
The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource ...
Ajay Gopinathan, Zongpeng Li
SAC
2009
ACM
15 years 6 months ago
Component-based metrics applying the strength of dependency between classes
Component-Based Development(CBD) is an emerging discipline for promoting practical reuse of software. In CBD, by building new software with independently developed components, we ...
Misook Choi, Injoo J. Kim, Jiman Hong, Jungyeop Ki...
BIRTHDAY
2009
Springer
15 years 6 months ago
Formal Series of General Algebras over a Field and Their Syntactic Algebras
Any mapping S : C → K, where K is a field and C = (C, Σ) is a Σ-algebra, is called a KC-series. These series are natural generalizations of both formal series on strings over...
Zoltán Fülöp, Magnus Steinby
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
15 years 6 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert