Sciweavers

3735 search results - page 623 / 747
» Order compression schemes
Sort
View
92
Voted
ASIACRYPT
2003
Springer
15 years 6 months ago
Generalized Powering Functions and Their Application to Digital Signatures
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Ka...
95
Voted
CAISE
2003
Springer
15 years 6 months ago
Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications
Location tracking technologies are penetrating increasingly in industrial environments. Several challenges arise when people or mobile assets are tracked. Security is one of the ma...
Ana Isabel González-Tablas Ferreres, Benjam...
DBISP2P
2003
Springer
152views Database» more  DBISP2P 2003»
15 years 5 months ago
An Adaptive and Scalable Middleware for Distributed Indexing of Data Streams
Abstract. We are witnessing a dramatic increase in the use of datacentric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and various ...
Ahmet Bulut, Roman Vitenberg, Fatih Emekçi,...
90
Voted
GECCO
2003
Springer
15 years 5 months ago
Mining Comprehensible Clustering Rules with an Evolutionary Algorithm
In this paper, we present a novel evolutionary algorithm, called NOCEA, which is suitable for Data Mining (DM) clustering applications. NOCEA evolves individuals that consist of a ...
Ioannis A. Sarafis, Philip W. Trinder, Ali M. S. Z...
HOLOMAS
2003
Springer
15 years 5 months ago
Complex Data Integration Based on a Multi-agent System
The expansion of the WWW and the growth of data sources lead to the proliferation of heterogeneous data (texts, images, videos, sounds and relational views). We call these data ”...
Omar Boussaid, Fadila Bentayeb, Amandine Duffoux, ...