Sciweavers

1166 search results - page 170 / 234
» Adaptively Secure Broadcast
Sort
View
ISCA
2005
IEEE
141views Hardware» more  ISCA 2005»
15 years 6 months ago
RegionScout: Exploiting Coarse Grain Sharing in Snoop-Based Coherence
It has been shown that many requests miss in all remote nodes in shared memory multiprocessors. We are motivated by the observation that this behavior extends to much coarser grai...
Andreas Moshovos
123
Voted
CRYPTO
2001
Springer
111views Cryptology» more  CRYPTO 2001»
15 years 5 months ago
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
Consider a scenario where an l-bit secret has been distributed among n players by an honest dealer using some secret sharing scheme. Then, if all players behave honestly, the secre...
Ronald Cramer, Ivan Damgård, Serge Fehr
AINA
2004
IEEE
15 years 4 months ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
CIVR
2008
Springer
207views Image Analysis» more  CIVR 2008»
15 years 2 months ago
Accumulated motion energy fields estimation and representation for semantic event detection
In this paper, a motion-based approach for detecting highlevel semantic events in video sequences is presented. Its main characteristic is its generic nature, i.e. it can be direc...
Georgios Th. Papadopoulos, Vasileios Mezaris, Ioan...
93
Voted
CSREASAM
2006
15 years 1 months ago
Framework for realizing Mobile and Computer Communications through Color Signals
: This paper proposes a technology for realizing a mobile network based on color signals which does not require the time and the space switching matrix for call routing. In absence...
Rajarshi Sanyal