Sciweavers

2778 search results - page 25 / 556
» Limit complexities revisited
Sort
View
ASIACRYPT
2008
Springer
14 years 11 months ago
Twisted Edwards Curves Revisited
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a ...
Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Car...
CORR
2007
Springer
92views Education» more  CORR 2007»
14 years 9 months ago
Revisiting the Issues On Netflow Sample and Export Performance
The high volume of packets and packet rates of traffic on some router links makes it exceedingly difficult for routers to examine every packet in order to keep detailed statistics ...
Hamed Haddadi, Raul Landa, Miguel Rio, Saleem N. B...
CORR
2012
Springer
222views Education» more  CORR 2012»
13 years 5 months ago
A limit process for partial match queries in random quadtrees
We consider the problem of recovering items matching a partially specified pattern in multidimensional trees (quad trees and k-d trees). We assume the classical model where the d...
Nicolas Broutin, Ralph Neininger, Henning Sulzbach
SIGCOMM
2006
ACM
15 years 3 months ago
Revisiting IP multicast
This paper revisits a much explored topic in networking – the search for a simple yet fully-general multicast design. The many years of research into multicast routing have led ...
Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenke...
JIDM
2010
122views more  JIDM 2010»
14 years 8 months ago
Revisiting "Privacy Preserving Clustering by Data Transformation"
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying data values subjected to clustering w...
Stanley R. M. Oliveira, Osmar R. Zaïane