Sciweavers

1094 search results - page 145 / 219
» List signature schemes
Sort
View
ASIACRYPT
2003
Springer
15 years 1 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang
TC
1998
14 years 9 months ago
Optimal Zero-Aliasing Space Compaction of Test Responses
—Many built-in self-testing (BIST) schemes compress the test responses from a k-output circuit to q signature streams, where q << k, a process termed space compaction. The ...
Krishnendu Chakrabarty, Brian T. Murray, John P. H...
IPPS
2003
IEEE
15 years 3 months ago
Energy Aware Scheduling for Distributed Real-Time Systems
Power management has become popular in mobile computing as well as in server farms. Although a lot of work has been done to manage the energy consumption on uniprocessor real-time...
Ramesh Mishra, Namrata Rastogi, Dakai Zhu, Daniel ...
IADIS
2003
14 years 11 months ago
Versioning of E-Learning Objects Enabling Flexible Reuse
One promise that has always been made in the field of e-learning is the possibility to create and deliver learning material that is adaptable to individual learners. Realising thi...
Wolfgang Theilmann, Michael Altenhofen
WWW
2007
ACM
15 years 10 months ago
Using d-gap patterns for index compression
Sequential patterns of d-gaps exist pervasively in inverted lists of Web document collection indices due to the cluster property. In this paper the information of d-gap sequential...
Jinlin Chen, Terry Cook