Sciweavers

1058 search results - page 140 / 212
» Secure Group Communications Using Key Graphs
Sort
View
CRYPTO
2007
Springer
109views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight and can be applied in various quantum-cryptographic settings. Protocols for quant...
Ivan Damgård, Serge Fehr, Renato Renner, Lou...
121
Voted
INFORMATICALT
2007
123views more  INFORMATICALT 2007»
15 years 2 months ago
Design and Implementation of Parallel Counterpropagation Networks Using MPI
The objective of this research is to construct parallel models that simulate the behavior of artificial neural networks. The type of network that is simulated in this project is t...
Athanasios Margaris, Stavros Souravlas, Efthimios ...
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 2 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
111
Voted
INFOCOM
2000
IEEE
15 years 6 months ago
REUNITE: A Recursive Unicast Approach to Multicast
—We propose a new multicast protocol called REUNITE. The key idea of REUNITE is to use recursive unicast trees to implement multicast service. REUNITE does not use class D IP add...
Ion Stoica, T. S. Eugene Ng, Hui Zhang
OOPSLA
2010
Springer
15 years 24 days ago
Parallel inclusion-based points-to analysis
Inclusion-based points-to analysis provides a good trade-off between precision of results and speed of analysis, and it has been incorporated into several production compilers inc...
Mario Méndez-Lojo, Augustine Mathew, Keshav...