Trans. Comput. Sci.最新文献

筛选
英文 中文
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines 内存认证的硬件机制:现有技术和引擎的综述
Trans. Comput. Sci. Pub Date : 2009-03-27 DOI: 10.1007/978-3-642-01004-0_1
R. Elbaz, D. Champagne, C. Gebotys, R. Lee, N. R. Potlapally, L. Torres
{"title":"Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines","authors":"R. Elbaz, D. Champagne, C. Gebotys, R. Lee, N. R. Potlapally, L. Torres","doi":"10.1007/978-3-642-01004-0_1","DOIUrl":"https://doi.org/10.1007/978-3-642-01004-0_1","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115476715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
Collusion-Resistant Message Authentication in Overlay Multicast Communication 覆盖组播通信中的抗合谋消息认证
Trans. Comput. Sci. Pub Date : 2009-03-27 DOI: 10.1007/978-3-642-01004-0_4
E. E. Mohamed, H. Abdel-Wahab
{"title":"Collusion-Resistant Message Authentication in Overlay Multicast Communication","authors":"E. E. Mohamed, H. Abdel-Wahab","doi":"10.1007/978-3-642-01004-0_4","DOIUrl":"https://doi.org/10.1007/978-3-642-01004-0_4","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123659068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools 基于角色访问控制模型的彩色Petri网和CPNtools安全性分析
Trans. Comput. Sci. Pub Date : 2009-03-27 DOI: 10.1007/978-3-642-01004-0_9
Hind Rakkay, H. Boucheneb
{"title":"Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools","authors":"Hind Rakkay, H. Boucheneb","doi":"10.1007/978-3-642-01004-0_9","DOIUrl":"https://doi.org/10.1007/978-3-642-01004-0_9","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Hardware Architecture for Integrated-Security Services 集成安全服务的硬件体系结构
Trans. Comput. Sci. Pub Date : 2009-03-27 DOI: 10.1007/978-3-642-01004-0_12
F. D. Pereira, E. Moreno
{"title":"A Hardware Architecture for Integrated-Security Services","authors":"F. D. Pereira, E. Moreno","doi":"10.1007/978-3-642-01004-0_12","DOIUrl":"https://doi.org/10.1007/978-3-642-01004-0_12","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128484962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure and Efficient Group Key Agreements for Cluster Based Networks 基于集群的网络安全有效的组密钥协议
Trans. Comput. Sci. Pub Date : 2009-03-27 DOI: 10.1007/978-3-642-01004-0_6
Ratna Dutta, T. Dowling
{"title":"Secure and Efficient Group Key Agreements for Cluster Based Networks","authors":"Ratna Dutta, T. Dowling","doi":"10.1007/978-3-642-01004-0_6","DOIUrl":"https://doi.org/10.1007/978-3-642-01004-0_6","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"297-301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130802516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The Average Solution of a Stochastic Nonlinear Schrodinger Equation under Stochastic Complex Non-homogeneity and Complex Initial Conditions 随机复非齐次和复初始条件下随机非线性薛定谔方程的平均解
Trans. Comput. Sci. Pub Date : 2009-02-13 DOI: 10.1007/978-3-642-00212-0_8
M. El-Tawil
{"title":"The Average Solution of a Stochastic Nonlinear Schrodinger Equation under Stochastic Complex Non-homogeneity and Complex Initial Conditions","authors":"M. El-Tawil","doi":"10.1007/978-3-642-00212-0_8","DOIUrl":"https://doi.org/10.1007/978-3-642-00212-0_8","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Voronoi Diagram of Circles and Its Application to the Visualization of the Growth of Particles Voronoi圆图及其在粒子生长可视化中的应用
Trans. Comput. Sci. Pub Date : 2009-02-13 DOI: 10.1007/978-3-642-00212-0_2
F. Anton, D. Mioc, C. Gold
{"title":"The Voronoi Diagram of Circles and Its Application to the Visualization of the Growth of Particles","authors":"F. Anton, D. Mioc, C. Gold","doi":"10.1007/978-3-642-00212-0_2","DOIUrl":"https://doi.org/10.1007/978-3-642-00212-0_2","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129789931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Neural Network Representation for the Forces and Torque of the Eccentric Sphere Model 偏心球模型力和力矩的神经网络表示
Trans. Comput. Sci. Pub Date : 2009-02-13 DOI: 10.1007/978-3-642-00212-0_9
Mostafa Y. Elbakry, Mohammed El-Helly, Mahmoud Y. Elbakry
{"title":"Neural Network Representation for the Forces and Torque of the Eccentric Sphere Model","authors":"Mostafa Y. Elbakry, Mohammed El-Helly, Mahmoud Y. Elbakry","doi":"10.1007/978-3-642-00212-0_9","DOIUrl":"https://doi.org/10.1007/978-3-642-00212-0_9","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Missing Data Analysis: A Kernel-Based Multi-Imputation Approach 缺失数据分析:一种基于核的多插值方法
Trans. Comput. Sci. Pub Date : 2009-02-13 DOI: 10.1007/978-3-642-00212-0_7
Shichao Zhang, Zhi Jin, Xiaofeng Zhu, Jilian Zhang
{"title":"Missing Data Analysis: A Kernel-Based Multi-Imputation Approach","authors":"Shichao Zhang, Zhi Jin, Xiaofeng Zhu, Jilian Zhang","doi":"10.1007/978-3-642-00212-0_7","DOIUrl":"https://doi.org/10.1007/978-3-642-00212-0_7","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125090901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Designing Aircraft Cockpit Displays: Borrowing from Multimodal User Interfaces 设计飞机座舱显示:借鉴多模态用户界面
Trans. Comput. Sci. Pub Date : 2009-02-13 DOI: 10.1007/978-3-642-00212-0_3
M. Jovanovic, D. Starcevic, Z. Obrenovic
{"title":"Designing Aircraft Cockpit Displays: Borrowing from Multimodal User Interfaces","authors":"M. Jovanovic, D. Starcevic, Z. Obrenovic","doi":"10.1007/978-3-642-00212-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-00212-0_3","url":null,"abstract":"","PeriodicalId":418065,"journal":{"name":"Trans. Comput. Sci.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125948168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信