Sciweavers

31686 search results - page 6196 / 6338
» Resource typing in Guru
Sort
View
JCST
2008
120views more  JCST 2008»
15 years 24 days ago
Generic Transformation from Weakly to Strongly Unforgeable Signatures
Current techniques for transforming unforgeable signature schemes (the forged message has never been signed) to strongly unforgeable ones (the forged message could have been signed...
Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao
128
Voted
JCST
2008
124views more  JCST 2008»
15 years 24 days ago
Clustering by Pattern Similarity
The task of clustering is to identify classes of similar objects among a set of objects. The definition of similarity varies from one clustering model to another. However, in most ...
Haixun Wang, Jian Pei
75
Voted
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 23 days ago
An annotation based approach to support design communication
The aim of this paper is to propose an approach based on the concept of annotation for supporting design communication. In this paper, we describe a co-operative design case study...
Onur Hisarciklilar, Jean-François Boujut
102
Voted
CORR
2007
Springer
86views Education» more  CORR 2007»
15 years 23 days ago
Variations on Information Embedding in Multiple Access and Broadcast Channels
Information embedding (IE) is the transmission of information within a host signal subject to a distortion constraint. There are two types of embedding methods, namely irreversibl...
Shivaprasad Kotagiri, J. Nicholas Laneman
126
Voted
ISCI
2006
145views more  ISCI 2006»
15 years 23 days ago
Processing count queries over event streams at multiple time granularities
Management and analysis of streaming data has become crucial with its applications in web, sensor data, network traffic data, and stock market. Data streams consist of mostly nume...
Aykut Ünal, Yücel Saygin, Özgü...
« Prev « First page 6196 / 6338 Last » Next »