Sciweavers

7066 search results - page 210 / 1414
» Contact Relations with Applications
Sort
View
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 10 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
127
Voted
VLDB
2004
ACM
100views Database» more  VLDB 2004»
15 years 10 months ago
Online Balancing of Range-Partitioned Data with Applications to Peer-to-Peer Systems
We consider the problem of horizontally partitioning a dynamic relation across a large number of disks/nodes by the use of range partitioning. Such partitioning is often desirable...
Prasanna Ganesan, Mayank Bawa, Hector Garcia-Molin...
HICSS
2003
IEEE
177views Biometrics» more  HICSS 2003»
15 years 10 months ago
Is the Applicability of Web-Based Surveys for Academic Research Limited to the Field of Information Technology?
Currently, the Internet provides researchers with the opportunity to conduct online surveys in a more efficient and effective way than was previously allowed by traditional means....
Narcyz Roztocki, Nawal Ait Lahri
IEEEICCI
2002
IEEE
15 years 9 months ago
Computational Intelligence for Medical Knowledge Acquisition with Application to Glaucoma
This paper presents an approach that integrates computational intelligence/soft computing paradigms with clinical investigation methods and knowledge. Computational intelligence m...
Nicolae Varachiu, Cynthia Karanicolas, Mihaela Uli...
ISAAC
2001
Springer
98views Algorithms» more  ISAAC 2001»
15 years 9 months ago
Fragmentary Pattern Matching: Complexity, Algorithms and Applications for Analyzing Classic Literary Works
A fragmentary pattern is a multiset of non-empty strings, and it matches a string w if all the strings in it occur within w without any overlaps. We study some fundamental issues o...
Hideaki Hori, Shinichi Shimozono, Masayuki Takeda,...