Sciweavers

1610 search results - page 255 / 322
» Identity Based Multisignatures
Sort
View
NDSS
2002
IEEE
15 years 5 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
113
Voted
BICOB
2010
Springer
15 years 5 months ago
Biological Relevance Detection via Network Dynamic Analysis
Most existing approaches for gene selection are based on evaluating the statistical relevance. However, there are remarkable discrepancies between statistical relevance and biolog...
Zheng Zhao, Huan Liu, Jiangxin Wang, Yung Chang
72
Voted
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 5 months ago
Estimation of arrival-departure capacity tradeoffs in multi-airport systems
Abstract— The accurate estimation of airport capacity is critical for the efficient planning of landing and takeoff operations, and the mitigation of congestion-induced delays. ...
Varun Ramanujam, Hamsa Balakrishnan
87
Voted
CSE
2009
IEEE
15 years 5 months ago
Processing Approximate Moving Range Queries in Mobile Sensor Environments
— The ubiquity of mobile devices has led to a rising demand for location-based services and applications. A major part of these services is based on the location-detection capabi...
Antoniya Petkova, Kien A. Hua, Alexander J. Aved
EDBT
2009
ACM
85views Database» more  EDBT 2009»
15 years 5 months ago
Expressive, yet tractable XML keys
Constraints are important for a variety of XML recommendations and applications. Consequently, there are numerous opportunities for advancing the treatment of XML semantics. In pa...
Sven Hartmann, Sebastian Link