Sciweavers

20175 search results - page 53 / 4035
» Is abstraction the key to computing
Sort
View
112
Voted
INFORMATICALT
2010
107views more  INFORMATICALT 2010»
14 years 9 months ago
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
Abstract. In 2008, based on the two-party Diffie
Yuh-Min Tseng, Tsu-Yang Wu
104
Voted
CISIS
2008
IEEE
15 years 7 months ago
Hybrid Performance Modeling and Prediction of Large-Scale Computing Systems
Abstract—Performance is a key feature of large-scale computing systems. However, the achieved performance when a certain program is executed is significantly lower than the maxi...
Sabri Pllana, Siegfried Benkner, Fatos Xhafa, Leon...
129
Voted
TCSV
2002
125views more  TCSV 2002»
15 years 5 days ago
Object-based video abstraction for video surveillance systems
ased Video Abstraction for Video Surveillance Systems Changick Kim, Member, IEEE, and Jenq-Neng Hwang, Fellow, IEEE Key frames are the subset of still images which best t the conte...
Changick Kim, Jenq-Neng Hwang
88
Voted
ACISP
2006
Springer
15 years 4 months ago
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Abstract. A security proof in the Bellare
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
CANS
2008
Springer
159views Cryptology» more  CANS 2008»
15 years 2 months ago
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...