Sciweavers

1405 search results - page 272 / 281
» We Are No Longer A Priesthood
Sort
View
TIT
2008
187views more  TIT 2008»
14 years 8 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
DMSN
2010
ACM
14 years 8 months ago
Facilitating fine grained data provenance using temporal data model
E-science applications use fine grained data provenance to maintain the reproducibility of scientific results, i.e., for each processed data tuple, the source data used to proce...
Mohammad Rezwanul Huq, Andreas Wombacher, Peter M....
93
Voted
SAMOS
2010
Springer
14 years 7 months ago
Accelerating high-level engineering computations by automatic compilation of Geometric Algebra to hardware accelerators
Abstract—Geometric Algebra (GA), a generalization of quaternions, is a very powerful form for intuitively expressing and manipulating complex geometric relationships common to en...
Jens Huthmann, Peter Muller, Florian Stock, Dietma...
TALG
2010
110views more  TALG 2010»
14 years 7 months ago
Approximating fractional hypertree width
Fractional hypertree width is a hypergraph measure similar to tree width and hypertree width. Its algorithmic importance comes from the fact that, as shown in previous work [14], ...
Dániel Marx
96
Voted
TMC
2010
250views more  TMC 2010»
14 years 7 months ago
Duty Cycle Control for Low-Power-Listening MAC Protocols
Energy efficiency is of the utmost importance in wireless sensor networks. The family of low-power-listening MAC protocols was proposed to reduce one form of energy dissipation...
Christophe J. Merlin, Wendi Beth Heinzelman