Sciweavers

14165 search results - page 2711 / 2833
» The generalized two-server problem
Sort
View
150
Voted
EUROCRYPT
1999
Springer
15 years 9 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
EUROCRYPT
1999
Springer
15 years 9 months ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart
GIS
1999
ACM
15 years 9 months ago
Animated Cartography for Urban Soundscape Information
In urban areas, city noises represent today a great problem. They are real nuisances for city-dwellers. Noises are caused by traffic, road works, factories, and also by people. So...
Myoung-Ah Kang, Sylvie Servigne
157
Voted
KDD
1999
ACM
166views Data Mining» more  KDD 1999»
15 years 9 months ago
CACTUS - Clustering Categorical Data Using Summaries
Clustering is an important data mining problem. Most of the earlier work on clustering focussed on numeric attributes which have a natural ordering on their attribute values. Rece...
Venkatesh Ganti, Johannes Gehrke, Raghu Ramakrishn...
MMB
1999
Springer
249views Communications» more  MMB 1999»
15 years 9 months ago
A Development Platform for the Design and Optimization of Mobile Radio Networks
The rapidly increasing traffic demand from mobile users forces network operators and service providers to extend and optimize existing networks as well as to plan entirely new mo...
Jürgen Deissner, Gerhard Fettweis, Jörg ...
« Prev « First page 2711 / 2833 Last » Next »