Sciweavers

2485 search results - page 319 / 497
» Enabling Simulation Interoperability
Sort
View
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
ICICS
2009
Springer
15 years 9 months ago
Secure Remote Execution of Sequential Computations
Abstract. We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contributi...
Ghassan Karame, Mario Strasser, Srdjan Capkun
LION
2009
Springer
145views Optimization» more  LION 2009»
15 years 9 months ago
A Variable Neighborhood Descent Search Algorithm for Delay-Constrained Least-Cost Multicast Routing
Abstract. The rapid evolution of real-time multimedia applications requires Quality of Service (QoS) based multicast routing in underlying computer networks. The constrained Steine...
Rong Qu, Ying Xu, Graham Kendall
NOSSDAV
2009
Springer
15 years 9 months ago
Cross-tree adjustment for spatialized audio streaming over networked virtual environments
In recent years, integrated spatialized voice services have become an appealing application for networked virtual environments (NVE), e.g., Second Life. With a spatialized voice s...
Ke Liang, Roger Zimmermann
CDC
2008
IEEE
113views Control Systems» more  CDC 2008»
15 years 9 months ago
Norm optimal Cross-Coupled Iterative Learning Control
— In this paper, we focus on improving contour tracking in precision motion control (PMC) applications through the use of Cross-Coupled Iterative Learning Control (CCILC). Initia...
Kira Barton, Jeroen van de Wijdeven, Andrew Alleyn...