Sciweavers

849 search results - page 66 / 170
» Completely Non-malleable Schemes
Sort
View
ISW
2009
Springer
15 years 7 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
91
Voted
AINA
2008
IEEE
15 years 7 months ago
Opportunistic Data Dissemination Using Real-World User Mobility Traces
— Opportunistic communication allows humans equipped with mobile devices to exchange information via a wireless link whenever they are nearby. This work examines the performance ...
Andreas Heinemann, Jussi Kangasharju, Max Müh...
112
Voted
IPPS
2007
IEEE
15 years 6 months ago
Packet Reordering in Network Processors
Network processors today consists of multiple parallel processors (microengines) with support for multiple threads to exploit packet level parallelism inherent in network workload...
S. Govind, R. Govindarajan, Joy Kuri
98
Voted
IWCLS
2007
Springer
15 years 6 months ago
Revisiting UCS: Description, Fitness Sharing, and Comparison with XCS
Abstract. This paper provides a deep insight into the learning mechanisms of UCS, a learning classifier system (LCS) derived from XCS that works under a supervised learning scheme...
Albert Orriols-Puig, Ester Bernadó-Mansilla
96
Voted
MICRO
2006
IEEE
89views Hardware» more  MICRO 2006»
15 years 6 months ago
DMDC: Delayed Memory Dependence Checking through Age-Based Filtering
One of the main challenges of modern processor design is the implementation of a scalable and efficient mechanism to detect memory access order violations as a result of out-of-o...
Fernando Castro, Luis Piñuel, Daniel Chaver...