Sciweavers

12193 search results - page 73 / 2439
» It's not all about
Sort
View
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
15 years 3 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 6 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
GECCO
2007
Springer
147views Optimization» more  GECCO 2007»
15 years 6 months ago
Exact analysis of the sampling distribution for the canonical particle swarm optimiser and its convergence during stagnation
Several theoretical analyses of the dynamics of particle swarms have been offered in the literature over the last decade. Virtually all rely on substantial simplifications, incl...
Riccardo Poli, David S. Broomhead
ICNP
1998
IEEE
15 years 4 months ago
Distributed Packet Rewriting and its Application to Scalable Server Architectures
To construct high performance Web servers, system builders are increasingly turning to distributed designs. An important challenge that arises in such designs is the need to direc...
Azer Bestavros, Mark Crovella, Jun Liu, David Mart...
LREC
2010
309views Education» more  LREC 2010»
15 years 1 months ago
Comment Extraction from Blog Posts and Its Applications to Opinion Mining
Blog posts containing many personal experiences or perspectives toward specific subjects are useful. Blogs allow readers to interact with bloggers by placing comments on specific ...
Huan-An Kao, Hsin-Hsi Chen