Sciweavers

2526 search results - page 278 / 506
» A Comparative Evaluation of Name-Matching Algorithms
Sort
View
ICONS
2008
IEEE
15 years 11 months ago
An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three
DL systems with bilinear structure recently became an important base for cryptographic protocols such as identity-based encryption (IBE). Since the main computational task is the ...
Giray Kömürcü, Erkay Savas
120
Voted
ICDM
2005
IEEE
122views Data Mining» more  ICDM 2005»
15 years 10 months ago
Finding Representative Set from Massive Data
In the information age, data is pervasive. In some applications, data explosion is a significant phenomenon. The massive data volume poses challenges to both human users and comp...
Feng Pan, Wei Wang 0010, Anthony K. H. Tung, Jiong...
120
Voted
ISPEC
2005
Springer
15 years 10 months ago
Robust Routing in Malicious Environment for Ad Hoc Networks
Abstract. Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the...
Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, W...
WABI
2005
Springer
110views Bioinformatics» more  WABI 2005»
15 years 10 months ago
Alignment of Tandem Repeats with Excision, Duplication, Substitution and Indels (EDSI)
Abstract. Traditional sequence comparison by alignment applies a mutation model comprising two events, substitutions and indels (insertions or deletions) of single positions (SI). ...
Michael Sammeth, Thomas Weniger, Dag Harmsen, Jens...
FPGA
2004
ACM
120views FPGA» more  FPGA 2004»
15 years 10 months ago
Flexibility measurement of domain-specific reconfigurable hardware
Traditional metrics used to compare hardware designs include area, performance, and power. However, these metrics do not form a complete evaluation of reconfigurable hardware. For...
Katherine Compton, Scott Hauck