Sciweavers

1690 search results - page 313 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
130
Voted
TIFS
2010
186views more  TIFS 2010»
15 years 1 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
134
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Efficient modular glass box software model checking
Glass box software model checking incorporates novel techniques to identify similarities in the state space of a model checker and safely prune large numbers of redundant states w...
Michael Roberson, Chandrasekhar Boyapati
118
Voted
CORR
2011
Springer
145views Education» more  CORR 2011»
14 years 10 months ago
MDS Array Codes with Optimal Rebuilding
—MDS array codes are widely used in storage systems to protect data against erasures. We address the rebuilding ratio problem, namely, in the case of erasures, what is the the fr...
Itzhak Tamo, Zhiying Wang, Jehoshua Bruck
151
Voted
IJNSEC
2011
145views more  IJNSEC 2011»
14 years 10 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
127
Voted
TKDE
2011
133views more  TKDE 2011»
14 years 10 months ago
Collaborative Filtering with Personalized Skylines
— Collaborative filtering (CF) systems exploit previous ratings and similarity in user behavior to recommend the top-k objects/records which are potentially most interesting to t...
Ilaria Bartolini, Zhenjie Zhang, Dimitris Papadias