Sciweavers

896 search results - page 157 / 180
» On completeness of word reversing
Sort
View
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
15 years 10 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
CTRSA
2009
Springer
128views Cryptology» more  CTRSA 2009»
15 years 8 months ago
Short Redactable Signatures Using Random Trees
Abstract. A redactable signature scheme for a string of objects supports verification even if multiple substrings are removed from the original string. It is important that the re...
Ee-Chien Chang, Chee Liang Lim, Jia Xu
NOCS
2009
IEEE
15 years 8 months ago
A GALS many-core heterogeneous DSP platform with source-synchronous on-chip interconnection network
This paper presents a many-core heterogeneous computational platform that employs a GALS compatible circuit-switched on-chip network. The platform targets streaming DSP and embedd...
Anh T. Tran, Dean Truong, Bevan M. Baas
MHCI
2009
Springer
15 years 8 months ago
Designing phrase builder: a mobile real-time query expansion interface
As users enter web queries, real-time query expansion (RTQE) interfaces offer suggestions based on an index garnered from query logs. In selecting a suggestion, users can potentia...
Tim Paek, Bongshin Lee, Bo Thiesson
129
Voted
OTM
2009
Springer
15 years 8 months ago
Ontology-Driven Provenance Management in eScience: An Application in Parasite Research
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in scientific applications to verify experime...
Satya Sanket Sahoo, D. Brent Weatherly, Raghava Mu...