Sciweavers

5153 search results - page 691 / 1031
» Introduction to Randomized Algorithms
Sort
View
CRYPTO
1989
Springer
163views Cryptology» more  CRYPTO 1989»
15 years 8 months ago
Undeniable Signatures
Abstract. In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algo...
David Chaum, Hans Van Antwerpen
CISC
2007
Springer
155views Cryptology» more  CISC 2007»
15 years 8 months ago
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Abstract. In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not h...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
DATE
2007
IEEE
138views Hardware» more  DATE 2007»
15 years 8 months ago
Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems
Energy-saving is extremely important in real-time embedded systems. Dynamic Voltage Scaling (DVS) is one of the prime techniques used to achieve energy-saving. Due to the uncertai...
Meikang Qiu, Chun Xue, Zili Shao, Edwin Hsing-Mean...
ICANN
2009
Springer
15 years 8 months ago
Profiling of Mass Spectrometry Data for Ovarian Cancer Detection Using Negative Correlation Learning
This paper proposes a novel Mass Spectrometry data profiling method for ovarian cancer detection based on negative correlation learning (NCL). A modified Smoothed Nonlinear Energy ...
Shan He, Huanhuan Chen, Xiaoli Li, Xin Yao
CODES
2004
IEEE
15 years 8 months ago
Automatic synthesis of system on chip multiprocessor architectures for process networks
In this paper, we present an approach for automatic synthesis of System on Chip (SoC) multiprocessor architectures for applications expressed as process networks. Our approach is ...
Basant Kumar Dwivedi, Anshul Kumar, M. Balakrishna...