Sciweavers

5647 search results - page 1053 / 1130
» A word from the editor
Sort
View
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 3 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
76
Voted
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
15 years 3 months ago
Information in Health Care Process - Evaluation Toolkit Development
Increasing health care costs put a great strain on national economies. In recent years there have been several national and regional research and development projects in Finland a...
Heidi Häkkinen, Pekka Turunen, Ton A. M. Spil
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
15 years 3 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
SAINT
2003
IEEE
15 years 3 months ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
85
Voted
WWW
2003
ACM
15 years 3 months ago
Finnish Museums on the Semantic Web
This article presents the semantic portal MUSEUMFINLAND for publishing heterogeneous museum collections on the Semantic Web. It is shown how museums with their semantically rich a...
Eero Hyvönen, Suvi Kettula, Vilho Raatikka, S...
« Prev « First page 1053 / 1130 Last » Next »