Sciweavers

3022 search results - page 96 / 605
» Make Way for WayMaker
Sort
View
89
Voted
EUROCRYPT
2004
Springer
15 years 6 months ago
Sequential Aggregate Signatures from Trapdoor Permutations
An aggregate signature scheme (recently proposed by Boneh, Gentry, Lynn, and Shacham) is a method for combining n signatures from n different signers on n different messages int...
Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Ho...
81
Voted
GG
2004
Springer
15 years 6 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
109
Voted
ICA
2004
Springer
15 years 6 months ago
Temporal Decorrelation as Preprocessing for Linear and Post-nonlinear ICA
Abstract. We present a straightforward way to use temporal decorrelation as preprocessing in linear and post-nonlinear independent component analysis (ICA) with higher order statis...
Juha Karvanen, Toshihisa Tanaka
119
Voted
IMR
2004
Springer
15 years 6 months ago
Parallel Mesh Refinement Without Communication
This paper presents a technique for the adaptive refinement of tetrahedral meshes. What makes it unique is that no neighbor information is required for the refined mesh to be co...
Philippe P. Pébay, David C. Thompson
ISMIR
2004
Springer
120views Music» more  ISMIR 2004»
15 years 6 months ago
The Anatomy of a Bibliographic Search System for Music
Traditional library catalog systems have been effective in providing access to collections of books, films, and other material. However, they have many limitations when it comes ...
Ryan Scherle, Donald Byrd