Sciweavers

405 search results - page 74 / 81
» An Agent Construction Model for Ubiquitous Computing Devices
Sort
View
VLSID
2002
IEEE
172views VLSI» more  VLSID 2002»
14 years 8 months ago
Improvement of ASIC Design Processes
With device counts on modern-day ASICs crossing the 10 million mark, careful planning of an ASIC design project is necessary to meet time deadlines. Two problems arise in this con...
Vineet Sahula, C. P. Ravikumar, D. Nagchoudhuri
CORR
2008
Springer
96views Education» more  CORR 2008»
13 years 7 months ago
New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures
The concept of universal designated verifier signatures was introduced by Steinfeld, Bull, Wang and Pieprzyk at Asiacrypt 2003. These signatures can be used as standard publicly ve...
Damien Vergnaud
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
12 years 11 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
GECCO
2004
Springer
14 years 1 months ago
A Systematic Study of Genetic Algorithms with Genotype Editing
Abstract. This paper continues our systematic study of an RNAediting computational model of Genetic Algorithms (GA). This model is constructed based on several genetic editing char...
Chien-Feng Huang, Luis Mateus Rocha
PET
2007
Springer
14 years 1 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis