Sciweavers

7434 search results - page 56 / 1487
» Still
Sort
View
ISW
2009
Springer
15 years 6 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
SAT
2009
Springer
124views Hardware» more  SAT 2009»
15 years 6 months ago
Cardinality Networks and Their Applications
We introduce Cardinality Networks, a new CNF encoding of cardinality constraints. It improves upon the previously existing encodings such as the sorting networks of [ES06] in that ...
Roberto Asín, Robert Nieuwenhuis, Albert Ol...
CLUSTER
2008
IEEE
15 years 6 months ago
Intelligent compilers
—The industry is now in agreement that the future of architecture design lies in multiple cores. As a consequence, all computer systems today, from embedded devices to petascale ...
John Cavazos
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
15 years 6 months ago
Exploring E-Commerce Readiness in China: The Case of the Grocery Industry
Electronic Commerce which enables business transactions to be conducted electronically has demonstrated significant operational and strategic benefits. Developed countries have ac...
Sherah Kurnia
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 6 months ago
Bounded-Variance Network Calculus: Computation of Tight Approximations of End-to-End Delay
Abstract ⎯ Currently, the most advanced framework for stochastic network calculus is the min-plus algebra, providing bounds for the end-to-end delay in networks. The bounds calcu...
Paolo Giacomazzi, Gabriella Saddemi