Sciweavers

1628 search results - page 118 / 326
» Compiler Construction Using Scheme
Sort
View
ICTAI
2006
IEEE
15 years 8 months ago
Outlier Detection Using Random Walks
The discovery of objects with exceptional behavior is an important challenge from a knowledge discovery standpoint and has attracted much attention recently. In this paper, we pre...
H. D. K. Moonesinghe, Pang-Ning Tan
122
Voted
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
15 years 2 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
148
Voted
HCW
1999
IEEE
15 years 6 months ago
Multiple Cost Optimization for Task Assignment in Heterogeneous Computing Systems Using Learning Automata
A framework for task assignment in heterogeneous computing systems is presented in this work. The framework is based on a learning automata model. The proposed model can be used f...
Raju D. Venkataramana, N. Ranganathan
ICCSA
2007
Springer
15 years 8 months ago
Public Key Encryption with Keyword Search Based on K-Resilient IBE
An encrypted email is sent from Bob to Alice. A gateway wants to check whether a certain keyword exists in an email or not for some reason (e.g. routing). Nevertheless Alice does n...
Dalia Khader
CDC
2009
IEEE
125views Control Systems» more  CDC 2009»
15 years 5 months ago
Partial feedback control of quantum systems using probabilistic fuzzy estimator
Abstract— A partial feedback control scheme with a probabilistic fuzzy estimator (PFE) is presented for the robust control of quantum systems. In this scheme, a probabilistic fuz...
Chunlin Chen, Gerasimos G. Rigatos, Daoyi Dong, J....