Sciweavers

790 search results - page 33 / 158
» Hierarchical Group Signatures
Sort
View
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 6 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
119
Voted
KES
2004
Springer
15 years 6 months ago
Multi-modal Data Fusion: A Description
Clustering groups records that are similar to each other into the same group, and those that are less similar into different groups. Clustering data of mixed types is difficult du...
Sarah Coppock, Lawrence J. Mazlack
89
Voted
CN
2000
69views more  CN 2000»
15 years 15 days ago
Hierarchical source routing using implied costs
Based on a loss network model, we present an adaptive source routing scheme for a large, hierarchically organized network. To represent the ``available'' capacity of a p...
Michael Montgomery, Gustavo de Veciana
99
Voted
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
14 years 11 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
108
Voted
CORR
2006
Springer
102views Education» more  CORR 2006»
15 years 22 days ago
Structural Inference of Hierarchies in Networks
One property of networks that has received comparatively little attention is hierarchy, i.e., the property of having vertices that cluster together in groups, which then join to f...
Aaron Clauset, Cristopher Moore, M. E. J. Newman