Sciweavers

10 search results - page 2 / 2
» jcst 2007
Sort
View
JCST
2007
76views more  JCST 2007»
13 years 4 months ago
A Semi-Random Multiple Decision-Tree Algorithm for Mining Data Streams
Xuegang Hu, Pei-Pei Li, Xindong Wu, Gong-Qing Wu
JCST
2010
147views more  JCST 2010»
13 years 3 months ago
A New Approach for Multi-Document Update Summarization
Fast changing knowledge on the Internet can be acquired more efficiently with the help of automatic document summarization and updating techniques. This paper describes a novel app...
Chong Long, Minlie Huang, Xiaoyan Zhu, Ming Li
JCST
2007
98views more  JCST 2007»
13 years 4 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
JCST
2007
97views more  JCST 2007»
13 years 4 months ago
Improved Collision Attack on Hash Function MD5
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that ...
Jie Liang, Xue-Jia Lai
JCST
2007
151views more  JCST 2007»
13 years 4 months ago
Indexing Future Trajectories of Moving Objects in a Constrained Network
Abstract Advances in wireless sensor networks and positioning technologies enable new applications monitoring moving objects. Some of these applications, such as traffic managemen...
Ji-Dong Chen, Xiao-Feng Meng