Sciweavers

2608 search results - page 335 / 522
» Issue Management
Sort
View
127
Voted
IJBC
2006
93views more  IJBC 2006»
15 years 3 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
137
Voted
WINET
2010
199views more  WINET 2010»
15 years 1 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
124
Voted
HIPEAC
2009
Springer
15 years 10 months ago
Mapping and Synchronizing Streaming Applications on Cell Processors
Developing streaming applications on heterogenous multi-processor architectures like the Cell is difficult. Currently, application developers need to know about hardware details t...
Maik Nijhuis, Herbert Bos, Henri E. Bal, Cé...
119
Voted
CCS
2007
ACM
15 years 9 months ago
Preserving privacy in gps traces via uncertainty-aware path cloaking
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintainin...
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...
139
Voted
SIGCSE
2006
ACM
201views Education» more  SIGCSE 2006»
15 years 9 months ago
Everything I needed to know about teaching I learned in kindergarten: bringing elementary education techniques to undergraduate
By expanding the teaching styles used in computer science classrooms, we can expand the audience of students that enjoy and excel in technology. Rather than focusing on major curr...
Shannon Pollard, Robert C. Duvall