Sciweavers

17288 search results - page 3253 / 3458
» Hybrid Optimizations: Which Optimization Algorithm to Use
Sort
View
ICASSP
2009
IEEE
15 years 8 months ago
Evolution of social P2P networks based on the dynamics of heterogeneous multimedia peers
In this paper, we consider social peer-to-peer (P2P) networks, where peers are sharing their resources (i.e., multimedia content and upload bandwidth). In the considered P2P netwo...
Hyunggon Park, Mihaela van der Schaar
ASIACRYPT
2006
Springer
15 years 8 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
BROADNETS
2006
IEEE
15 years 8 months ago
SMART: An Optical Infrastructure for Future Internet
A new scalable optical network infrastructure SMART is proposed based on light-trails and hypernetwork architecture. The underlying physical network of SMART is a reconfigurable WD...
Si-Qing Zheng, Ashwin Gumaste
DSD
2004
IEEE
104views Hardware» more  DSD 2004»
15 years 8 months ago
A Static Low-Power, High-Performance 32-bit Carry Skip Adder
In this paper, we present a full-static carry-skip adder designed to achieve low power dissipation and high-performance operation. To reduce the adder's delay and power consu...
Kai Chirca, Michael J. Schulte, John Glossner, Hao...
CCS
2006
ACM
15 years 8 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
« Prev « First page 3253 / 3458 Last » Next »