Sciweavers

755 search results - page 99 / 151
» ideas 2005
Sort
View
WOWMOM
2005
ACM
112views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A Hidden Environment Model for Constructing Indoor Radio Maps
Constructing indoor radio maps plays an important role in many services and applications such as wireless base station planning. In this paper, we propose a hybrid approach to con...
Zhe Xiang, Hangjin Zhang, Jian Huang, Song Song, K...
ACISP
2005
Springer
15 years 3 months ago
Tunable Balancing of RSA
We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanc...
Steven D. Galbraith, Chris Heneghan, James F. McKe...
ACISP
2005
Springer
15 years 3 months ago
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
Abstract. Multivariate public-key cryptosystems (sometimes polynomial-based PKC’s or just multivariates) handle polynomials of many variables over relatively small fields instea...
Bo-Yin Yang, Jiun-Ming Chen
ADHOCNOW
2005
Springer
15 years 3 months ago
Message Stability and Reliable Broadcasts in Mobile Ad-Hoc Networks
Abstract. Many to many reliable broadcast is useful while building distributed services like group membership and agreement in a MANET. Efforts in implementing reliable broadcast ...
Kulpreet Singh, Andronikos Nedos, Gregor Gärt...
ADMA
2005
Springer
143views Data Mining» more  ADMA 2005»
15 years 3 months ago
A Comprehensive Benchmark of the Artificial Immune Recognition System (AIRS)
: Artificial Immune Systems are a new class of algorithms inspired by how the immune system recognizes, attacks and remembers intruders. This is a fascinating idea, but to be accep...
Lingjun Meng, Peter van der Putten, Haiyang Wang