Sciweavers

849 search results - page 129 / 170
» Completely Non-malleable Schemes
Sort
View
ASIACRYPT
2005
Springer
15 years 10 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
GECCO
2005
Springer
106views Optimization» more  GECCO 2005»
15 years 10 months ago
Fitness uniform deletion: a simple way to preserve diversity
A commonly experienced problem with population based optimisation methods is the gradual decline in population diversity that tends to occur over time. This can slow a system’s ...
Shane Legg, Marcus Hutter
ISPA
2005
Springer
15 years 10 months ago
Percentage Coverage Configuration in Wireless Sensor Networks
Abstract. Recent researches on energy efficient coverage configuration in wireless sensor networks mainly address the goal of 100% or near 100% coverage preserving. However, we fin...
Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
ISRR
2005
Springer
130views Robotics» more  ISRR 2005»
15 years 10 months ago
Wave Haptics: Encoderless Virtual Stiffnesses
Haptic rendering commonly implements virtual springs using DC motors with current amplifiers and encoder-based position feedback. In these schemes, quantization, discretization, ...
Günter Niemeyer, Nicola Diolaiti, Neal A. Tan...
CASES
2004
ACM
15 years 10 months ago
Memory overflow protection for embedded systems using run-time checks, reuse and compression
Title of thesis: MEMORY OVERFLOW PROTECTION FOR EMBEDDED SYSTEMS USING RUN-TIME CHECKS, REUSE AND COMPRESSION Surupa Biswas, Master of Science, 2004 Thesis directed by: Assistant ...
Surupa Biswas, Matthew Simpson, Rajeev Barua