Sciweavers

1865 search results - page 107 / 373
» Pan-Private Streaming Algorithms
Sort
View
JDCTA
2010
228views more  JDCTA 2010»
14 years 11 months ago
Research and Progress of Cluster Algorithms based on Granular Computing
Granular Computing (GrC), a knowledge-oriented computing which covers the theory of fuzzy information granularity, rough set theory, the theory of quotient space and interval comp...
Shifei Ding, Li Xu, Hong Zhu, Liwen Zhang
SJ
2010
133views more  SJ 2010»
15 years 2 months ago
Dichotomy Slot Allocation: A QoS Guaranteed Scheduling Algorithm for Input-Queued Switches
—With the rapid increase of real-time applications, jitter, delay, and throughput have become the three important QoS criteria in the scheduling of input-queued (IQ) switches wit...
Jingjing Zhang, Nirwan Ansari, Yaohui Jin, Weishen...
CSE
2011
IEEE
14 years 4 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...
MM
2005
ACM
115views Multimedia» more  MM 2005»
15 years 10 months ago
Accurate repeat finding and object skipping using fingerprints
This paper introduces a novel and very accurate segmentation algorithm. It is very efficient and consumes less than 10% of CPU on a simple desktop PC to segment a stream in real-t...
Cormac Herley
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 8 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui