Sciweavers

51 search results - page 8 / 11
» Signcryption and Its Applications in Efficient Public Key So...
Sort
View
89
Voted
CCS
2005
ACM
15 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
ICASSP
2010
IEEE
14 years 7 months ago
Bandwidth-intensive FPGA architecture for multi-dimensional DFT
Multi-dimensional (MD) Discrete Fourier Transform (DFT) is a key kernel algorithm in many signal processing algorithms, including radar data processing and medical imaging. Althou...
Chi-Li Yu, Chaitali Chakrabarti, Sungho Park, Vija...
BMCBI
2008
106views more  BMCBI 2008»
14 years 9 months ago
Ontology Design Patterns for bio-ontologies: a case study on the Cell Cycle Ontology
Background: Bio-ontologies are key elements of knowledge management in bioinformatics. Rich and rigorous bio-ontologies should represent biological knowledge with high fidelity an...
Mikel Egaña Aranguren, Erick Antezana, Mart...
84
Voted
ICICS
2003
Springer
15 years 2 months ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
DAC
2002
ACM
15 years 10 months ago
Constraint-driven communication synthesis
Constraint-driven Communication Synthesis enables the automatic design of the communication architecture of a complex system from a library of pre-defined Intellectual Property (I...
Alessandro Pinto, Luca P. Carloni, Alberto L. Sang...