Sciweavers

679 search results - page 81 / 136
» Using decision problems in public key cryptography
Sort
View
ISM
2008
IEEE
140views Multimedia» more  ISM 2008»
15 years 7 months ago
Medical Video Event Classification Using Shared Features
Advances in video technology are being incorporated into today’s medical research and education. Medical videos contain important medical events, such as diagnostic or therapeut...
Yu Cao, Shih-Hsi Liu, Ming Li, Sung Baang, Sanqing...
IJWIN
2002
154views more  IJWIN 2002»
15 years 1 months ago
Connection Admission Control for PCS-to-Internet Protocol Internetworking
This paper studies the connection admission control for PCS-to-Internet protocol internetworking. In order to provide QoS to the Internet and avoid scalability problems, several re...
Fei Yu, Victor C. M. Leung
ISCI
2008
159views more  ISCI 2008»
15 years 1 months ago
Large scale evolutionary optimization using cooperative coevolution
Evolutionary algorithms (EAs) have been applied with success to many numerical and combinatorial optimization problems in recent years. However, they often lose their effectivenes...
Zhenyu Yang, Ke Tang, Xin Yao
WISEC
2009
ACM
15 years 8 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
ARESEC
2011
117views more  ARESEC 2011»
14 years 1 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve