Sciweavers

657 search results - page 13 / 132
» A Version Numbering Scheme with a Useful Lexicographical Ord...
Sort
View
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
13 years 11 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
CADE
2005
Springer
14 years 7 months ago
Proof Planning for First-Order Temporal Logic
Proof planning is an automated reasoning technique which improves proof search by raising it to a meta-level. In this paper we apply proof planning to First-Order Linear Temporal L...
Claudio Castellini, Alan Smaill
MOBICOM
2006
ACM
14 years 1 months ago
A replica distrubution scheme for location-dependent information on vehicular ad hoc networks
In this paper we propose Road-aware Skip Copy (RSC) method for distributing replicas of location-dependent data on server-less vehicular ad hoc networks in urban areas. In the RSC...
M. Yamanaka, G. Tsuchida, S. Ishihara
ICDM
2008
IEEE
102views Data Mining» more  ICDM 2008»
14 years 1 months ago
Mining Order-Preserving Submatrices from Data with Repeated Measurements
Order-preserving submatrices (OPSM’s) have been shown useful in capturing concurrent patterns in data when the relative magnitudes of data items are more important than their ab...
Chun Kit Chui, Ben Kao, Kevin Y. Yip, Sau Dan Lee
TSP
2010
13 years 2 months ago
Improved interference cancellation scheme for two-user detection of alamouti code
In this paper, we propose an improved interference cancellation method for two-user multiple access based MIMO communication system. It is shown in the paper, that by using the pr...
Manav R. Bhatnagar, Are Hjørungnes