Sciweavers

555 search results - page 93 / 111
» Improved results for a memory allocation problem
Sort
View
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
15 years 1 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
SIGMOD
2001
ACM
193views Database» more  SIGMOD 2001»
15 years 10 months ago
Epsilon Grid Order: An Algorithm for the Similarity Join on Massive High-Dimensional Data
The similarity join is an important database primitive which has been successfully applied to speed up applications such as similarity search, data analysis and data mining. The s...
Christian Böhm, Bernhard Braunmüller, Fl...
IEEEARES
2008
IEEE
15 years 4 months ago
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACL management suffer some problems that need to be addressed in order to...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Marti...
WSCG
2004
143views more  WSCG 2004»
14 years 11 months ago
View Dependent Stochastic Sampling for Efficient Rendering of Point Sampled Surfaces
In this paper we present a new technique for rendering very large datasets representing point-sampled surfaces. Rendering efficiency is considerably improved by using stochastic s...
Sushil Bhakar, Liang Luo, Sudhir P. Mudur
GLOBECOM
2006
IEEE
15 years 3 months ago
A Directional MAC Protocol for Practical Smart Antennas
- Recently, several MAC protocols using directional antennas, typically referred to as directional MAC protocols, have been proposed for wireless ad hoc networks. However, the MAC ...
Yuya Takatsuka, Katsushiro Nagashima, Masanori Tak...