Sciweavers

679 search results - page 127 / 136
» Using decision problems in public key cryptography
Sort
View
ADHOC
2007
122views more  ADHOC 2007»
14 years 11 months ago
Minimum latency joint scheduling and routing in wireless sensor networks
Wireless sensor networks are expected to be used in a wide range of applications from environment monitoring to event detection. The key challenge is to provide energy efficient ...
Gang Lu, Bhaskar Krishnamachari
TKDE
2002
91views more  TKDE 2002»
14 years 11 months ago
The EVE Approach: View Synchronization in Dynamic Distributed Environments
The construction and maintenance of data warehouses (views) in large-scale environments composed of numerous distributed and evolving information sources (ISs) such as the WWW has ...
Amy J. Lee, Anisoara Nica, Elke A. Rundensteiner
IWANN
2009
Springer
15 years 6 months ago
Identifying Gene Ontology Areas for Automated Enrichment
Biomedical ontologies provide a commonly accepted scheme for the characterization of biological concepts that enable knowledge sharing and integration. Updating and maintaining an ...
Catia Pesquita, Tiago Grego, Francisco M. Couto
EUROCRYPT
2010
Springer
15 years 4 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
IJDAR
2010
110views more  IJDAR 2010»
14 years 10 months ago
Locating and parsing bibliographic references in HTML medical articles
The set of references that typically appear toward the end of journal articles is sometimes, though not always, a field in bibliographic (citation) databases. But even if referenc...
Jie Zou, Daniel X. Le, George R. Thoma