Sciweavers

562 search results - page 10 / 113
» Recent Developments in the Design of Conventional Cryptograp...
Sort
View
DEXA
2008
Springer
117views Database» more  DEXA 2008»
15 years 1 months ago
Space-Partitioning-Based Bulk-Loading for the NSP-Tree in Non-ordered Discrete Data Spaces
Properly-designed bulk-loading techniques are more efficient than the conventional tuple-loading method in constructing a multidimensional index tree for a large data set. Although...
Gang Qian, Hyun-Jeong Seok, Qiang Zhu, Sakti Prama...
IJNSEC
2007
137views more  IJNSEC 2007»
14 years 11 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
15 years 1 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
ICIP
2005
IEEE
16 years 1 months ago
Comparative study: face recognition on unspecific persons using linear subspace methods
Recently many Automatic Face Recognition (AFR) systems were developed for applications with unspecific persons, which is different from conventional pattern recognition problems wh...
Dahua Lin, Shuicheng Yan, Xiaoou Tang
HIS
2001
15 years 1 months ago
Global Optimisation of Neural Networks Using a Deterministic Hybrid Approach
Selection of the topology of a neural network and correct parameters for the learning algorithm is a tedious task for designing an optimal artificial neural...
Gleb Beliakov, Ajith Abraham