Sciweavers

10 search results - page 2 / 2
» jcst 2007
Sort
View
JCST
2007
76views more  JCST 2007»
14 years 11 months ago
A Semi-Random Multiple Decision-Tree Algorithm for Mining Data Streams
Xuegang Hu, Pei-Pei Li, Xindong Wu, Gong-Qing Wu
JCST
2010
147views more  JCST 2010»
14 years 10 months ago
A New Approach for Multi-Document Update Summarization
Fast changing knowledge on the Internet can be acquired more efficiently with the help of automatic document summarization and updating techniques. This paper describes a novel app...
Chong Long, Minlie Huang, Xiaoyan Zhu, Ming Li
JCST
2007
98views more  JCST 2007»
14 years 11 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
JCST
2007
97views more  JCST 2007»
14 years 11 months ago
Improved Collision Attack on Hash Function MD5
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that ...
Jie Liang, Xue-Jia Lai
JCST
2007
151views more  JCST 2007»
14 years 11 months ago
Indexing Future Trajectories of Moving Objects in a Constrained Network
Abstract Advances in wireless sensor networks and positioning technologies enable new applications monitoring moving objects. Some of these applications, such as traffic managemen...
Ji-Dong Chen, Xiao-Feng Meng