Sciweavers

9186 search results - page 1395 / 1838
» A Module System for Scheme
Sort
View
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
15 years 10 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
GLOBECOM
2006
IEEE
15 years 10 months ago
Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks
—Several dynamic call admission control (CAC) schemes for cellular networks have been proposed in the literature to reserve resources adaptively to provide the desired quality of...
Emre A. Yavuz, Victor C. M. Leung
131
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...
SACMAT
2006
ACM
15 years 10 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
ISCAS
2005
IEEE
218views Hardware» more  ISCAS 2005»
15 years 9 months ago
Scalable multiview video coding using wavelet
—Most existing multiview video coding (MVC) techniques are based on the traditional hybrid DCT-based video coding schemes, e.g., MPEG-2, MPEG-4 and H.264. They neither fully expl...
Wenxian Yang, Feng Wu, Yan Lu, Jianfei Cai, King N...
« Prev « First page 1395 / 1838 Last » Next »