Sciweavers

5107 search results - page 971 / 1022
» Data Mining and Information Retrieval
Sort
View
ACNS
2004
Springer
106views Cryptology» more  ACNS 2004»
15 years 3 months ago
On the Security of Cryptosystems with All-or-Nothing Transform
We study the data privacy of cryptosystems with All-or-Nothing transform (AONT). An AONT is an efficient computable transform with two properties: Given all the bits of its output...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
GCC
2003
Springer
15 years 3 months ago
Dominating-Set-Based Searching in Peer-to-Peer Networks
— The peer-to-peer network for sharing information and data through direct exchange has emerged rapidly in recent years. The searching problem is a basic issue that addresses the...
Chunlin Yang, Jie Wu
ICCS
2003
Springer
15 years 3 months ago
TCM-Grid: Weaving a Medical Grid for Traditional Chinese Medicine
We present a TCM-Grid for Traditional Chinese Medicine (TCM). The purpose of the TCM-Grid is to aid the development of distributed systems that help health professionals, researche...
Huajun Chen, Zhaohui Wu, Chang Huang, Jiefeng Xu
IPPS
2000
IEEE
15 years 2 months ago
Enhancing NWS for Use in an SNMP Managed Internetwork
The Network Weather Service NWS is a distributed resource monitoring and utilization prediction system, employed as an aid to scheduling jobs in a metacomputing environment 9, 1...
Robert E. Busby Jr., Mitchell L. Neilsen, Daniel A...
CHES
2006
Springer
117views Cryptology» more  CHES 2006»
15 years 1 months ago
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple...
Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafum...