Sciweavers

10284 search results - page 1967 / 2057
» Designing for nomadic work
Sort
View
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
14 years 1 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
GLOBECOM
2007
IEEE
14 years 1 months ago
Joint Traffic Blocking and Routing Under Network Failures and Maintenances
Under device failures and maintenance activities, network resources reduce and congestion may arise inside networks. As a result, users experience degraded performance on packet d...
Chao Liang, Zihui Ge, Yong Liu
GLVLSI
2007
IEEE
194views VLSI» more  GLVLSI 2007»
14 years 1 months ago
Probabilistic maximum error modeling for unreliable logic circuits
Reliability modeling and evaluation is expected to be one of the major issues in emerging nano-devices and beyond 22nm CMOS. Such devices would have inherent propensity for gate f...
Karthikeyan Lingasubramanian, Sanjukta Bhanja
EUROSYS
2009
ACM
14 years 1 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
GIS
2009
ACM
14 years 1 months ago
Classification of raster maps for automatic feature extraction
Raster maps are widely available and contain useful geographic features such as labels and road lines. To extract the geographic features, most research work relies on a manual st...
Yao-Yi Chiang, Craig A. Knoblock
« Prev « First page 1967 / 2057 Last » Next »