Sciweavers

9186 search results - page 1436 / 1838
» A Module System for Scheme
Sort
View
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
AIIA
2001
Springer
15 years 7 months ago
A New Machine Learning Approach to Fingerprint Classification
We present new fingerprint classification algorithms based on two machine learning approaches: support vector machines (SVMs), and recursive neural networks (RNNs). RNNs are traine...
Yuan Yao, Gian Luca Marcialis, Massimiliano Pontil...
127
Voted
ESOP
2000
Springer
15 years 7 months ago
A Calculus for Compiling and Linking Classes
Abstract. We describe a low-level calculus, called ink (pronounced "links"), designed to serve as an intermediate representation in compilers for class-based objectorient...
Kathleen Fisher, John H. Reppy, Jon G. Riecke
127
Voted
ICPP
1998
IEEE
15 years 7 months ago
A Real-Time Communication Method for Wormhole Switching Networks
In this paper, we propose a real-time communication scheme that can be used in general point-to-point real-time multicomputer systems with wormhole switching. Real-time communicat...
Byungjae Kim, Jong Kim, Sung Je Hong, Sunggu Lee
ISN
2000
Springer
162views Communications» more  ISN 2000»
15 years 7 months ago
An Approach to Network Control and Resource Management Based on Intelligent Agents
Network Control is currently carried out mainly by means of signalling protocols. Although these protocols are robust and facilitate standardisation, they present several drawback...
Evangelos Vayias, John Soldatos, Nikolas Mitrou
« Prev « First page 1436 / 1838 Last » Next »