Sciweavers

7978 search results - page 1369 / 1596
» Combining shared-coin algorithms
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
15 years 4 months ago
Parallel Hardware Architectures for the Cryptographic Tate Pairing
Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...
INFFUS
2008
97views more  INFFUS 2008»
15 years 4 months ago
Using classifier ensembles to label spatially disjoint data
act 11 We describe an ensemble approach to learning from arbitrarily partitioned data. The partitioning comes from the distributed process12 ing requirements of a large scale simul...
Larry Shoemaker, Robert E. Banfield, Lawrence O. H...
COMCOM
2007
94views more  COMCOM 2007»
15 years 4 months ago
Adaptive backup routing for ad-hoc networks
The network topology changes frequently in ad-hoc networks. Some on-demand protocols with multi-paths or backup routes have been proposed to improve the performance in ad-hoc netw...
Wei Kuang Lai, Sheng-Yu Hsiao, Yuh-Chung Lin
IPM
2008
134views more  IPM 2008»
15 years 4 months ago
RSS: A framework enabling ranked search on the semantic web
The semantic web not only contains resources but also includes the heterogeneous relationships among them, which is sharply distinguished from the current web. As the growth of th...
Xiaomin Ning, Hai Jin, Hao Wu
116
Voted
ISCI
2008
145views more  ISCI 2008»
15 years 4 months ago
Aggregation in sensor networks with a user-provided quality of service goal
Significant research has been devoted to aggregation in sensor networks with a view to optimize its performance. Existing research has mostly concentrated on maximizing network li...
Zhen He, Byung Suk Lee, Xiaoyang Sean Wang
« Prev « First page 1369 / 1596 Last » Next »