Sciweavers

97 search results - page 15 / 20
» er 2006
Sort
View
97
Voted
IBMSJ
1998
81views more  IBMSJ 1998»
15 years 14 days ago
T Spaces
Millions of small heterogeneous computers are poised to spread into the infrastructure of our society. Though mostly inconspicuous today, disguised as nothing more than PIM (perso...
Peter Wyckoff, Stephen W. McLaughry, Tobin J. Lehm...
110
Voted
RSA
2002
73views more  RSA 2002»
15 years 14 days ago
New and faster filters for multiple approximate string matching
We present three new algorithms for on-line multiple string matching allowing errors. These are extensions of previous algorithms that search for a single pattern. The average run...
Ricardo A. Baeza-Yates, Gonzalo Navarro
106
Voted
PAAPP
2007
115views more  PAAPP 2007»
15 years 9 days ago
Quantum computing: beyond the limits of conventional computation
The quantum model of computation not only o ers entirely new ways to manipulate information, but also allows information processing tasks to be formulated in unconventional, genui...
Marius Nagy, Selim G. Akl
135
Voted
PPL
2010
147views more  PPL 2010»
14 years 11 months ago
Key Distribution versus Key Enhancement in Quantum Cryptography
It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, ...
Naya Nagy, Marius Nagy, Selim G. Akl
ICDCS
2006
IEEE
15 years 6 months ago
Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc Networks
This paper presents an analysis of the control overhead involved in clustering and routing for one-hop clustered mobile ad hoc networks. Previous work on the analysis of control o...
Mingqiang Xue, Inn Inn Er, Winston Khoon Guan Seah