Sciweavers

1995 search results - page 295 / 399
» Adaptive Information Filtering using Evolutionary Computatio...
Sort
View
NDSS
1999
IEEE
14 years 1 days ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
WOWMOM
2005
ACM
126views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Personalized Service Composition for Ubiquitous Multimedia Delivery
Digital multimedia has gained popularity due to the huge success of the Internet. Users acquire and disseminate multimedia information using different types of devices and communi...
Swaroop Kalasapur, Mohan Kumar, Behrooz Shirazi
IPPS
2000
IEEE
14 years 5 days ago
Autonomous Consistency Technique in Distributed Database with Heterogeneous Requirements
Recently, the diversified types of companies have been trying to cooperate among them to cope with the dynamic market and thus integration of their DBs with heterogeneous requirem...
Hideo Hanamura, Isao Kaji, Kinji Mori
JSAC
2011
184views more  JSAC 2011»
13 years 2 months ago
Goodput Enhancement of VANETs in Noisy CSMA/CA Channels
— The growing interest in vehicular ad hoc networks (VANETs) enables decentralized traveler information systems to become more feasible and effective in Intelligent Transportatio...
Yusun Chang, Christopher P. Lee, John A. Copeland
FCCM
2004
IEEE
130views VLSI» more  FCCM 2004»
13 years 11 months ago
Hyperreconfigurable Architectures for Fast Run Time Reconfiguration
Dynamically reconfigurable architectures or systems are able to reconfigure their function and/or structure to suit changing needs of a computation during run time. The increasing...
Sebastian Lange, Martin Middendorf