Sciweavers

411 search results - page 25 / 83
» Efficient View Maintenance Using Version Numbers
Sort
View
ASIACRYPT
2000
Springer
15 years 4 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
116
Voted
NOMS
2002
IEEE
133views Communications» more  NOMS 2002»
15 years 5 months ago
Highly available and efficient load cluster management system using SNMP and Web
To cope with the explosive increase in the number of requests to Internet server systems, one popular solution is a load-balancing technique that uses a dispatcher in the front-en...
Myung-Sup Kim, Mi-Jeong Choi, James W. Hong
ICDE
2012
IEEE
291views Database» more  ICDE 2012»
13 years 11 months ago
Efficiently Monitoring Top-k Pairs over Sliding Windows
Top-k pairs queries have received significant attention by the research community. k-closest pairs queries, k-furthest pairs queries and their variants are among the most well stu...
Zhitao Shen, Muhammad Aamir Cheema, Xuemin Lin, We...
87
Voted
ACNS
2004
Springer
120views Cryptology» more  ACNS 2004»
15 years 4 months ago
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions
A general technique of batch verification for equality of discrete logarithms is proposed. Examples of batching threshold decryption schemes are presented based on threshold versio...
Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byou...
127
Voted
AAAI
2010
15 years 2 months ago
g-Planner: Real-time Motion Planning and Global Navigation using GPUs
We present novel randomized algorithms for solving global motion planning problems that exploit the computational capabilities of many-core GPUs. Our approach uses thread and data...
Jia Pan, Christian Lauterbach, Dinesh Manocha