Sciweavers

4463 search results - page 572 / 893
» computer 2000
Sort
View
ISW
2000
Springer
15 years 8 months ago
A Signcryption Scheme Based on Integer Factorization
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Ron Steinfeld, Yuliang Zheng
131
Voted
IWMM
2000
Springer
135views Hardware» more  IWMM 2000»
15 years 8 months ago
Conservative Garbage Collection for General Memory Allocators
This paper explains a technique that integrates conservative garbage collection on top of general memory allocators. This is possible by using two data structures named malloc-tab...
Gustavo Rodriguez-Rivera, Michael Spertus, Charles...
138
Voted
IWSAS
2000
Springer
15 years 8 months ago
Imposing Real-Time Constraints on Self-Adaptive Controller Synthesis
Abstract. Self-adaptive systems must recon gure themselves, at runtime, to compensate for changing environments, objectives, and system capabilities. This paper discusses how the S...
David J. Musliner
IWSSD
2000
IEEE
15 years 8 months ago
The Complexity of TRMCS-like Spiral Specification
Modern software is often constructed using "spiral specification"; i.e. the specification is a dynamic document that is altered by experience with the current version of...
Tim Menzies
KDD
2000
ACM
168views Data Mining» more  KDD 2000»
15 years 8 months ago
Scaling up dynamic time warping for datamining applications
There has been much recent interest in adapting data mining algorithms to time series databases. Most of these algorithms need to compare time series. Typically some variation of ...
Eamonn J. Keogh, Michael J. Pazzani