Sciweavers

77 search results - page 15 / 16
» How to Achieve a McEliece-Based Digital Signature Scheme
Sort
View
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
PERVASIVE
2008
Springer
13 years 5 months ago
Localized power-aware routing in linear wireless sensor networks
Energy-efficency is a key concern when designing protocols for wireless sensor networks (WSN). This is of particular importance in commercial applications where demonstrable retur...
Marco Zimmerling, Waltenegus Dargie, Johnathan M. ...
MSWIM
2004
ACM
13 years 10 months ago
Exploring long lifetime routing (LLR) in ad hoc networks
In mobile ad hoc networks, node mobility causes links between nodes to break frequently, thus terminating the lifetime of the routes containing those links. An alternative route h...
Zhao Cheng, Wendi Beth Heinzelman
CIVR
2007
Springer
139views Image Analysis» more  CIVR 2007»
13 years 11 months ago
Video search in concept subspace: a text-like paradigm
Though both quantity and quality of semantic concept detection in video are continuously improving, it still remains unclear how to exploit these detected concepts as semantic ind...
Xirong Li, Dong Wang, Jianmin Li, Bo Zhang
CIKM
2007
Springer
13 years 11 months ago
A volcano erupts: semantically mediated integration of heterogeneous volcanic and atmospheric data
We present a research effort into the application of semantic web methods and technologies to address the challenging problem of integrating heterogeneous volcanic and atmospheri...
Peter Fox, Deborah L. McGuinness, Robert Raskin, A...