Sciweavers

121 search results - page 21 / 25
» Breaking Fully-Homomorphic-Encryption Challenges
Sort
View
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 4 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
DATE
2007
IEEE
146views Hardware» more  DATE 2007»
14 years 4 months ago
DFM/DFY: should you trust the surgeon or the family doctor?
Everybody agrees that curing DFM/DFY issues is of paramount importance at 65 nanometers and beyond. Unfortunately, there is disagreement about how and when to cure them. “Surgeo...
Marco Casale-Rossi, Andrzej J. Strojwas, Robert C....
CIKM
2007
Springer
14 years 4 months ago
Effective top-k computation in retrieving structured documents with term-proximity support
Modern web search engines are expected to return top-k results efficiently given a query. Although many dynamic index pruning strategies have been proposed for efficient top-k com...
Mingjie Zhu, Shuming Shi, Mingjing Li, Ji-Rong Wen
ICDCS
2005
IEEE
14 years 3 months ago
End-to-End Fair Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks
— The shared-medium multi-hop nature of wireless ad hoc networks poses fundamental challenges to the design of an effective resource allocation algorithm to maximize spatial reus...
Baochun Li
ICDM
2005
IEEE
122views Data Mining» more  ICDM 2005»
14 years 3 months ago
ViVo: Visual Vocabulary Construction for Mining Biomedical Images
Given a large collection of medical images of several conditions and treatments, how can we succinctly describe the characteristics of each setting? For example, given a large col...
Arnab Bhattacharya, Vebjorn Ljosa, Jia-Yu Pan, Mar...