Sciweavers

9186 search results - page 1634 / 1838
» A Module System for Scheme
Sort
View
120
Voted
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal
117
Voted
DAGM
2007
Springer
15 years 8 months ago
Image Statistics and Local Spatial Conditions for Nonstationary Blurred Image Reconstruction
Deblurring is important in many visual systems. This paper presents a novel approach for nonstationary blurred image reconstruction with ringing reduction in a variational Bayesian...
Hongwei Zheng, Olaf Hellwich
115
Voted
DEXA
2007
Springer
173views Database» more  DEXA 2007»
15 years 8 months ago
A P2P Technique for Continuous k-Nearest-Neighbor Query in Road Networks
Due to the high frequency in location updates and the expensive cost of continuous query processing, server computation capacity and wireless communication bandwidth are the two li...
Fuyu Liu, Kien A. Hua, Tai T. Do
108
Voted
EPIA
2007
Springer
15 years 8 months ago
Improving Evolutionary Algorithms with Scouting
The goal of an Evolutionary Algorithm(EA) is to find the optimal solution to a given problem by evolving a set of initial potential solutions. When the problem is multi-modal, an ...
Konstantinos Bousmalis, Gillian M. Hayes, Jeffrey ...
123
Voted
ESAS
2007
Springer
15 years 8 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...
« Prev « First page 1634 / 1838 Last » Next »