Sciweavers

JCST
2007
76views more  JCST 2007»
13 years 4 months ago
A Semi-Random Multiple Decision-Tree Algorithm for Mining Data Streams
Xuegang Hu, Pei-Pei Li, Xindong Wu, Gong-Qing Wu
JCST
2007
70views more  JCST 2007»
13 years 4 months ago
Server-Based Data Push Architecture for Multi-Processor Environments
Xian-He Sun, Surendra Byna, Yong Chen
JCST
2007
97views more  JCST 2007»
13 years 4 months ago
Improved Collision Attack on Hash Function MD5
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that ...
Jie Liang, Xue-Jia Lai
JCST
2007
61views more  JCST 2007»
13 years 4 months ago
Visual Simulation of Multiple Unmixable Fluids
Wen Zheng, Jun-Hai Yong, Jean-Claude Paul
JCST
2007
98views more  JCST 2007»
13 years 4 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
JCST
2007
87views more  JCST 2007»
13 years 4 months ago
3D Morphing Using Strain Field Interpolation
Han-Bing Yan, Shi-Min Hu, Ralph R. Martin
JCST
2007
151views more  JCST 2007»
13 years 4 months ago
Indexing Future Trajectories of Moving Objects in a Constrained Network
Abstract Advances in wireless sensor networks and positioning technologies enable new applications monitoring moving objects. Some of these applications, such as traffic managemen...
Ji-Dong Chen, Xiao-Feng Meng