Sciweavers

402 search results - page 55 / 81
» Cryptosystems using Linear Groups
Sort
View
RSFDGRC
2005
Springer
112views Data Mining» more  RSFDGRC 2005»
15 years 3 months ago
Discovering Characteristic Individual Accessing Behaviors in Web Environment
Abstract. Discovering diverse individual accessing behaviors in web environment is required before mining the valuable patterns from behaviors of groups of visitors. In this paper,...
Long Wang 0002, Christoph Meinel, Chunnian Liu
ESA
2004
Springer
97views Algorithms» more  ESA 2004»
15 years 3 months ago
On Adaptive Integer Sorting
This paper considers integer sorting on a RAM. We show that adaptive sorting of a sequence with qn inversions is asymptotically equivalent to multisorting groups of at most q keys...
Anna Pagh, Rasmus Pagh, Mikkel Thorup
NIME
2004
Springer
162views Music» more  NIME 2004»
15 years 3 months ago
The Architecture of Auracle: a Real-Time, Distributed, Collaborative Instrument
Auracle is a “group instrument,” controlled by the voice, for real-time, interactive, distributed music making over the Internet. It is implemented in the JavaTM programming l...
Chandrasekhar Ramakrishnan, Jason Freeman, Kristja...
ICDCS
1997
IEEE
15 years 2 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh
EUROCRYPT
2006
Springer
15 years 1 months ago
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users...
Dan Boneh, Amit Sahai, Brent Waters