Sciweavers

5891 search results - page 123 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ACSAC
2000
IEEE
15 years 6 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
ICIP
2007
IEEE
16 years 3 months ago
Analysis of Coding Efficiency of Motion-Compensated Interpolation at the Decoder in Distributed Video Coding
This paper analyzes the coding efficiency of distributed video coding (DVC) schemes that perform motion-compensated interpolation at the decoder. The decoder has access only to th...
Marco Tagliasacchi, Laura Frigerio, Stefano Tubaro
172
Voted
COMPSAC
2004
IEEE
15 years 5 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
DAC
2006
ACM
15 years 7 months ago
Hierarchical power distribution and power management scheme for a single chip mobile processor
A hierarchical power distribution methodology that enables more than dozen power domains in a chip and a power management scheme using 20 power domains are described. This method ...
Toshihiro Hattori, Takahiro Irita, Masayuki Ito, E...
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 1 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...