Sciweavers

7049 search results - page 1395 / 1410
» Data Abstraction for CSP-OZ
Sort
View
172
Voted
VLSISP
2010
254views more  VLSISP 2010»
15 years 6 days ago
Manifold Based Local Classifiers: Linear and Nonlinear Approaches
Abstract In case of insufficient data samples in highdimensional classification problems, sparse scatters of samples tend to have many ‘holes’—regions that have few or no nea...
Hakan Cevikalp, Diane Larlus, Marian Neamtu, Bill ...
101
Voted
ASIACRYPT
2010
Springer
14 years 12 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
116
Voted
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 12 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
115
Voted
DLOG
2010
14 years 12 months ago
TBox Classification in Parallel: Design and First Evaluation
Abstract. One of the most frequently used inference services of description logic reasoners classifies all named classes of OWL ontologies into a subsumption hierarchy. Due to emer...
Mina Aslani, Volker Haarslev
GLOBECOM
2010
IEEE
14 years 12 months ago
An Experimental Comparison of Burst Packet Transmission Schemes in IEEE 802.11-Based Wireless Mesh Networks
Abstract--Wireless mesh networks (WMNs) are wireless multihop networks comprised of mesh routers, which relay traffic on behalf of clients and other nodes. Using the standard IEEE ...
Peter Dely, Andreas Kassler, Nico Bayer, Dmitry Si...
« Prev « First page 1395 / 1410 Last » Next »