Sciweavers

4411 search results - page 175 / 883
» Communication Complexity and Its Applications
Sort
View
127
Voted
CCR
2000
101views more  CCR 2000»
15 years 4 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
DPD
2002
125views more  DPD 2002»
15 years 4 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
176
Voted
SSS
2010
Springer
160views Control Systems» more  SSS 2010»
15 years 2 months ago
A Comparative Study of Rateless Codes for P2P Persistent Storage
Abstract. This paper evaluates the performance of two seminal rateless erasure codes, LT Codes and Online Codes. Their properties make them appropriate for coping with communicatio...
Heverson Borba Ribeiro, Emmanuelle Anceaume
LCTRTS
2010
Springer
15 years 11 months ago
Design exploration and automatic generation of MPSoC platform TLMs from Kahn Process Network applications
With increasingly more complex Multi-Processor Systems on Chip (MPSoC) and shortening time-to- market projections, Transaction Level Modeling and Platform Aware Design are seen as...
Ines Viskic, Lochi Lo Chi Yu Lo, Daniel Gajski
146
Voted
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
15 years 11 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...