Sciweavers

648 search results - page 2 / 130
» The GCHQ Protocol and Its Problems
Sort
View
NETWORKS
2007
13 years 5 months ago
Tailoring neighborhood search for the internet protocol network design problem with reliability and routing constraints
The Internet Protocol Network Design Problem with Reliability and Routing Constraints (IPRR) can be shortly stated as follows. A telecommunication network is given in terms of a s...
Luigi De Giovanni, Roberto Tadei
ISCAS
2005
IEEE
115views Hardware» more  ISCAS 2005»
13 years 11 months ago
VLSI architecture based on packet data transfer scheme and its application
Abstract— Packet data transfer scheme is introduced for intrachip data transfer to solve an interconnection problem. Double transmission lines are provided as a platform of the m...
Yuya Homma, Michitaka Kameyama, Yoshichika Fujioka...
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
13 years 11 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai
CONTEXT
2003
Springer
13 years 11 months ago
GRAVA: An Architecture Supporting Automatic Context Transitions and Its Application to Robust Computer Vision
We describe a software development approach for vision that enhances robustness by making novel use of context. Conventional approaches to most image understanding problems suffe...
Paul Robertson, Robert Laddaga
RAM
2008
IEEE
172views Robotics» more  RAM 2008»
14 years 4 days ago
VT Position Code Communication Technology and Its Implementation
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
ShiYing Zhou, GuiHe Qin, YuBo Jin