Sciweavers

3155 search results - page 203 / 631
» Maintenance: Less Is Not More
Sort
View
IEEECIT
2005
IEEE
15 years 10 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
114
Voted
ISCAS
2005
IEEE
123views Hardware» more  ISCAS 2005»
15 years 10 months ago
Jitter limitations on multi-carrier modulation
—A feasibility study is made of an OFDM system based on analog multipliers and integrate-and-dump blocks, targeted at Gb/s copper interconnects. The effective amplitude variation...
Jan H. Rutger Schrader, Eric A. M. Klumperink, Jan...
154
Voted
ISIPTA
2005
IEEE
151views Mathematics» more  ISIPTA 2005»
15 years 10 months ago
Towards a Unifying Theory of Logical and Probabilistic Reasoning
Logic and probability theory have both a long history in science. They are mainly rooted in philosophy and mathematics, but are nowadays important tools in many other fields such...
Rolf Haenni
ITCC
2005
IEEE
15 years 10 months ago
Dealing Cards in Poker Games
— This paper proposes a new protocol for shuffling and dealing cards, that is designed specifically for games of mental poker. Our protocol takes advantage of two features of p...
Philippe Golle
P2P
2005
IEEE
15 years 10 months ago
Finding Rare Data Objects in P2P File-Sharing Systems
Peer-to-peer file-sharing systems have hundreds of thousands of users sharing petabytes of data, however, their search functionality is limited. In general, query results contain...
Wai Gen Yee, Dongmei Jia, Ophir Frieder