Sciweavers

411 search results - page 25 / 83
» Efficient View Maintenance Using Version Numbers
Sort
View
ASIACRYPT
2000
Springer
15 years 1 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
NOMS
2002
IEEE
133views Communications» more  NOMS 2002»
15 years 2 months ago
Highly available and efficient load cluster management system using SNMP and Web
To cope with the explosive increase in the number of requests to Internet server systems, one popular solution is a load-balancing technique that uses a dispatcher in the front-en...
Myung-Sup Kim, Mi-Jeong Choi, James W. Hong
ICDE
2012
IEEE
291views Database» more  ICDE 2012»
13 years 9 months ago
Efficiently Monitoring Top-k Pairs over Sliding Windows
Top-k pairs queries have received significant attention by the research community. k-closest pairs queries, k-furthest pairs queries and their variants are among the most well stu...
Zhitao Shen, Muhammad Aamir Cheema, Xuemin Lin, We...
ACNS
2004
Springer
120views Cryptology» more  ACNS 2004»
15 years 1 months ago
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions
A general technique of batch verification for equality of discrete logarithms is proposed. Examples of batching threshold decryption schemes are presented based on threshold versio...
Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byou...
AAAI
2010
14 years 11 months ago
g-Planner: Real-time Motion Planning and Global Navigation using GPUs
We present novel randomized algorithms for solving global motion planning problems that exploit the computational capabilities of many-core GPUs. Our approach uses thread and data...
Jia Pan, Christian Lauterbach, Dinesh Manocha