Sciweavers

4184 search results - page 663 / 837
» Names of Our Lives
Sort
View
SCN
2010
Springer
145views Communications» more  SCN 2010»
15 years 8 days ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
103
Voted
SODA
2010
ACM
164views Algorithms» more  SODA 2010»
15 years 8 days ago
Hardness Results for Homology Localization
: © Hardness Results for Homology Localization Chao Chen, Daniel Freedman HP Laboratories HPL-2009-374 algebraic topology, homology, localization We address the problem of localiz...
Chao Chen, Daniel Freedman
TCS
2010
15 years 7 days ago
Strong normalization property for second order linear logic
The paper contains the first complete proof of strong normalization (SN) for full second order linear logic (LL): Girard’s original proof uses a standardization theorem which i...
Michele Pagani, Lorenzo Tortora de Falco
136
Voted
TKDE
2010
190views more  TKDE 2010»
15 years 7 days ago
Effectively Indexing the Uncertain Space
—With the rapid development of various optical, infrared, and radar sensors and GPS techniques, there are a huge amount of multidimensional uncertain data collected and accumulat...
Ying Zhang, Xuemin Lin, Wenjie Zhang, Jianmin Wang...
TMC
2010
230views more  TMC 2010»
15 years 7 days ago
Bandwidth Recycling in IEEE 802.16 Networks
—IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS). Bandwidth is reserved for each application to ensure the QoS. Fo...
D. Chuck, J. M. Chang