Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
See detailTussen isolement en verbondenheid. Bij wijze van inleiding
Levering, B.; Biesta, Gert UL; Weijers, I.

in Levering, B.; Biesta, Gert; Weijers, I. (Eds.) Thema's uit de wijsgerige en historische pedagogiek (1998)

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailTutela del lavoro e libertà d'impresa alla prova del diritto europeo
Ratti, Luca UL

in Il Lavoro nella Giurisprudenza (2017)

Detailed reference viewed: 21 (1 UL)
See detailTutorat: l'acte formatif
Weber, Jean-Marie UL

in Transfert Journal semestriel de la Formation Pédagogique des Enseignants- Stagiaires (2012), 1

Detailed reference viewed: 23 (0 UL)
Full Text
See detailA tutorial on multiple crack growth and intersections with XFEM
Sutula, Danas; Bordas, Stéphane UL

Presentation (2015, May 12)

Detailed reference viewed: 142 (9 UL)
Peer Reviewed
See detailTutoring and its effect on teachers.
Weber, Jean-Marie UL; Voynova, Ruzhena UL

Scientific Conference (2017, July)

Detailed reference viewed: 13 (2 UL)
See detailTwentieth-Century Fiction From Text to Context
Weber, Jean-Jacques UL; Verdonk, Peter

Book published by Routledge (1995)

Detailed reference viewed: 25 (0 UL)
See detailTwenty Years of Bialowieza: A Mathematical Anthology Aspects of differential geometric methods in physics
Ali, Syed Twareque UL; Emch, Gerald; Odzijewicz, Anatol et al

Book published by World Scientific (2005)

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailTwisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Chu, Dalin; Groszschädl, Johann UL; Liu, Zhe UL et al

in Chen, Kefei; Xie, Qi; Qiu, Weidong (Eds.) et al Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (2013, May)

Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress ... [more ▼]

Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress, the efficient implementation of Elliptic Curve Cryptography (ECC) for WSNs is still a very active research topic and techniques to further reduce the time and energy cost of ECC are eagerly sought. This paper presents an optimized ECC implementation that we developed from scratch to comply with the severe resource constraints of 8-bit sensor nodes such as the MICAz and IRIS motes. Our ECC software uses Optimal Prime Fields (OPFs) as underlying algebraic structure and supports two different families of elliptic curves, namely Weierstraß-form and twisted Edwards-form curves. Due to the combination of efficient field arithmetic and fast group operations, we achieve an execution time of 5.8*10^6 clock cycles for a full 158-bit scalar multiplication on an 8-bit ATmega128 microcontroller, which is 2.78 times faster than the widely-used TinyECC library. Our implementation also shows that the energy cost of scalar multiplication on a MICAz (or IRIS) mote amounts to just 19 mJ when using a twisted Edwards curve over a 160-bit OPF. This result compares fairly well with the energy figures of two recently-presented hardware designs of ECC based on twisted Edwards curves. [less ▲]

Detailed reference viewed: 207 (37 UL)
Full Text
Peer Reviewed
See detailTwistor space observables and quasi-amplitudes in 4D higher spin gravity
Colombo, Nicolo UL; Sundell, Per

in Journal of High Energy Physics [=JHEP] (2010)

Vasiliev equations facilitate globally defined formulations of higher-spin gravity in various correspondence spaces associated with different phases of the theory. In the four-dimensional case this ... [more ▼]

Vasiliev equations facilitate globally defined formulations of higher-spin gravity in various correspondence spaces associated with different phases of the theory. In the four-dimensional case this induces a map from a generally covariant formulation in spacetime with higher-derivative interactions to a formulation in terms of a deformed symplectic structure on a noncommutative doubled twistor space, sending spacetime boundary conditions to various sectors of an associative star-product algebra. We look at observables given by integrals over twistor space defining composite zero-forms in spacetime that do not break any local symmetries and that are closed on shell. They can be evaluated locally in spacetime and interpreted as building blocks for dual amplitudes. To regularize potential twistor-space divergencies arising in their curvature expansion, we propose a closed-contour prescription that respects associativity and hence higher-spin gauge symmetry. As a sample calculation, we examine next-to-leading corrections to quasi-amplitudes for twistor-space plane waves, and find cancellations that we interpret using transgression properties in twistor space. [less ▲]

Detailed reference viewed: 24 (3 UL)
See detailTwo Approaches to World Management
Katsikis, Nikolaos UL

in Brenner, Neil (Ed.) Implosions/Explosions: Towards a Study of Planetary Urbanization (2013)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailTwo dimensional Standard Deontic Logic [including a detailed analysis of the 1985 Jones-Pörn deontic logic system]
Boer, Mathijs De; Gabbay, Dov M. UL; Parent, Xavier UL et al

in Synthese (2012), 187(2), 623--660

Detailed reference viewed: 17 (0 UL)
Peer Reviewed
See detailTwo faces of the same coin: benign familial infantile seizures and paroxysmal kinesigenic dyskinesia caused by PRRT2 mutations.
Schmidt, Alexander; Kumar, Kishore R.; Redyk, Katharina et al

in Archives of neurology (2012), 69(5), 668-70

Detailed reference viewed: 22 (5 UL)
Full Text
Peer Reviewed
See detailTwo More Efficient Variants of the J-PAKE Protocol
Skrobot, Marjan UL; Lancrenon, Jean UL; Tang, Qiang UL

in ACNS 2016 (2016, June)

Recently, the password-authenticated key exchange protocol J-PAKE of Hao and Ryan (Workshop on Security Protocols 2008) was formally proven secure in the algebraic adversary model by Abdalla et al. (IEEE ... [more ▼]

Recently, the password-authenticated key exchange protocol J-PAKE of Hao and Ryan (Workshop on Security Protocols 2008) was formally proven secure in the algebraic adversary model by Abdalla et al. (IEEE S&P 2015). In this paper, we propose and examine two variants of J-PAKE - which we call RO-J-PAKE and CRS-J-PAKE - that each makes the use of two less zero-knowledge proofs than the original protocol. We show that they are provably secure following a similar strategy to that of Abdalla et al. We also study their efficiency as compared to J-PAKE's, also taking into account how the groups are chosen. Namely, we treat the cases of subgroups of finite fields and elliptic curves. Our work reveals that, for subgroups of finite fields, CRS-J-PAKE is indeed more efficient than J-PAKE, while RO-J-PAKE is much less efficient. On the other hand, when instantiated with elliptic curves, both RO-J-PAKE and CRS-J-PAKE are more efficient than J-PAKE, with CRS-J-PAKE being the best of the three. We illustrate this experimentally, making use of recent research by Brier et al. (CRYPTO 2010). Regardless of implementation, we note that RO-J-PAKE enjoys a looser security reduction than both J-PAKE and CRS-J-PAKE. CRS-J-PAKE has the tightest security proof, but relies on an additional trust assumption at setup time. We believe our results can be useful to anyone interested in implementing J-PAKE, as perhaps either of these two new protocols may also be options, depending on the deployment context. [less ▲]

Detailed reference viewed: 116 (25 UL)
See detailTwo Neighbors, One Vision? The Impact of the European Union's Accession on the Development of Sociology in the Common Border Region Slovenia and Southern Austria. PhD thesis, University of Graz.
Hoenig, Barbara UL

Doctoral thesis (2009)

This dissertation thesis in the sociology of knowledge investigates the impact of European Union's research policies on the formation of sociology as a scientific discipline. From a comparative ... [more ▼]

This dissertation thesis in the sociology of knowledge investigates the impact of European Union's research policies on the formation of sociology as a scientific discipline. From a comparative perspective, Slovenia and Austria as two small Central European neighbour states and their common border region are taken as a case study, applying a mixed methods design. Based on extensive empirical data analyses with a strong focus on scientific institutions, findings show enabling and constraining effects of opportunity structures given by Europeanization of research policies. Transnational cooperation of scholars contributes to a stock of knowledge more and more known as European sociology. [less ▲]

Detailed reference viewed: 37 (7 UL)
Full Text
See detailTwo new projects on the Early Cold War period of European Integration
Paravantis, Spero UL

Report (2016)

Core Junior Web Page Announcement

Detailed reference viewed: 13 (1 UL)