Sciweavers

73 search results - page 13 / 15
» sac 2002
Sort
View
SAC
2002
ACM
13 years 5 months ago
The P-tree algebra
The Peano Count Tree (P-tree) is a quadrant-based lossless tree representation of the original spatial data. The idea of P-tree is to recursively divide the entire spatial data, s...
Qin Ding, Maleq Khan, Amalendu Roy, William Perriz...
SAC
2002
ACM
13 years 5 months ago
Benefits of document maps for text access in knowledge management: a comparative study
Analyzing, structuring and organizing documented knowledge is an important aspect of knowledge management. In order to ease the access to text collections, in literature so-called...
Andreas Becks, Christian Seeling, Ralf Minkenberg
SAC
2002
ACM
13 years 5 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
SAC
2002
ACM
13 years 5 months ago
Statistical properties of the simulated time horizon in conservative parallel discrete-event simulations
We investigate the universal characteristics of the simulated time horizon of the basic conservative parallel algorithm when implemented on regular lattices. This technique [1, 2]...
G. Korniss, M. A. Novotny, A. K. Kolakowska, H. Gu...
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
13 years 11 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi