Sciweavers

2497 search results - page 418 / 500
» Requirements for models of achievable routing
Sort
View
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
15 years 5 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
APSEC
2004
IEEE
15 years 5 months ago
Quality Improvements by Integrating Development Processes
Software is an increasing and important part of many products and systems. Software, hardware, and system level components have been developed and produced following separate proc...
Annita Persson Dahlqvist, Ivica Crnkovic, Ulf Askl...
106
Voted
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
15 years 5 months ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick
ADBIS
2000
Springer
91views Database» more  ADBIS 2000»
15 years 5 months ago
Efficient Region Query Processing by Optimal Page Ordering
A number of algorithms of clustering spatial data for reducing the number of disk seeks required to process spatial queries have been developed. One of the algorithms is the scheme...
Daesoo Cho, Bonghee Hong
NGC
2000
Springer
109views Communications» more  NGC 2000»
15 years 5 months ago
Router level filtering for receiver interest delivery
Delivering data to on-line game participants requires the game data to be "customized" in real-time to each participant's characteristics. Using multicast in such a...
Manuel M. Oliveira, Jon Crowcroft, Christophe Diot