Sciweavers

674 search results - page 99 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
BMCBI
2008
132views more  BMCBI 2008»
13 years 7 months ago
The Average Mutual Information Profile as a Genomic Signature
Background: Occult organizational structures in DNA sequences may hold the key to understanding functional and evolutionary aspects of the DNA molecule. Such structures can also p...
Mark Bauer, Sheldon M. Schuster, Khalid Sayood
DCOSS
2008
Springer
13 years 9 months ago
Decoding Code on a Sensor Node
Abstract. Wireless sensor networks come of age and start moving out of the laboratory into the field. As the number of deployments is increasing the need for an efficient and relia...
Pascal von Rickenbach, Roger Wattenhofer
IPPS
1999
IEEE
13 years 12 months ago
A Novel Compilation Framework for Supporting Semi-Regular Distributions in Hybrid Applications
This paper explains how efficient support for semiregular distributions can be incorporated in a uniform compilation framework for hybrid applications. The key focus of this work ...
Dhruva R. Chakrabarti, Prithviraj Banerjee
TVCG
2002
104views more  TVCG 2002»
13 years 7 months ago
General Construction of Time-Domain Filters for Orientation Data
Capturing live motion has gained considerable attention in computer animation as an important motion generation technique. Canned motion data comprise both position and orientation...
Jehee Lee, Sung Yong Shin
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 11 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro