Sciweavers

2656 search results - page 428 / 532
» Design and analysis of algorithms reconsidered
Sort
View
ICUIMC
2009
ACM
15 years 11 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
MM
2009
ACM
144views Multimedia» more  MM 2009»
15 years 11 months ago
An interactive and multi-level framework for summarising user generated videos
We present an interactive and multi-level abstraction framework for user-generated video (UGV) summarisation, allowing a user the flexibility to select a summarisation criterion ...
Saman Cooray, Hervé Bredin, Li-Qun Xu, Noel...
FOCS
2008
IEEE
15 years 11 months ago
Noise Tolerance of Expanders and Sublinear Expander Reconstruction
We consider the problem of online sublinear expander reconstruction and its relation to random walks in “noisy” expanders. Given access to an adjacency list representation of ...
Satyen Kale, Yuval Peres, C. Seshadhri
GLOBECOM
2008
IEEE
15 years 11 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
GLVLSI
2008
IEEE
140views VLSI» more  GLVLSI 2008»
15 years 11 months ago
A table-based method for single-pass cache optimization
Due to the large contribution of the memory subsystem to total system power, the memory subsystem is highly amenable to customization for reduced power/energy and/or improved perf...
Pablo Viana, Ann Gordon-Ross, Edna Barros, Frank V...