Sciweavers

464 search results - page 56 / 93
» Enjoy the Paper: Lexicology
Sort
View
AAECC
2009
Springer
138views Algorithms» more  AAECC 2009»
15 years 1 months ago
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
Abstract. We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto'07. Our work introduces: 1) ...
Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki ...
DEXAW
2004
IEEE
136views Database» more  DEXAW 2004»
15 years 1 months ago
A Protocol for Reputation Management in Super-Peer Networks
Peer-to-Peer (P2P) applications have recently seen an enormous success and have reached millions of users. The main reason of this success is the anonymity the users enjoy. Howeve...
Shalendra Chhabra, Ernesto Damiani, Sabrina De Cap...
HPCN
2000
Springer
15 years 1 months ago
Dynamic Reconfiguration in Coordination Languages
A rather recent approach in programming parallel and distributed systems is that of coordination models and languages. Coordination programming enjoys a number of advantages such a...
George A. Papadopoulos, Farhad Arbab
AINA
2008
IEEE
14 years 11 months ago
3MOKAN: A Novel Mobility Management Mechanism Based on Keeping Alternative Nodes
A mobile ad hoc network (MANET) is a network without any predefined infrastructure in which every node not only enjoys the services from the network, but serves the network as a r...
Mahmood Hasanlou, Ebrahim Fazli, Ali Movaghar, Hos...
ASPDAC
2005
ACM
109views Hardware» more  ASPDAC 2005»
14 years 11 months ago
BDD-based two variable sharing extraction
It has been shown that Binary Decision Diagram (BDD) based logic synthesis enjoys faster runtime than the classic logic synthesis systems based on Sum of Product (SOP) form. Howev...
Dennis Wu, Jianwen Zhu