Sciweavers

539 search results - page 59 / 108
» Distributed Source Coding using Abelian Group Codes
Sort
View
COMCOM
2011
13 years 3 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
14 years 1 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
BMCBI
2007
105views more  BMCBI 2007»
13 years 8 months ago
HoxPred: automated classification of Hox proteins using combinations of generalised profiles
Background: Correct identification of individual Hox proteins is an essential basis for their study in diverse research fields. Common methods to classify Hox proteins focus on th...
Morgane Thomas-Chollier, Luc Leyns, Valérie...
PLDI
2005
ACM
14 years 2 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
SERP
2007
13 years 10 months ago
Developing an Online Function Reader
A function reader is a program that can read an input function and evaluate the function for a given input value at run time. Any Computer Algebra System and Graphing Calculator ar...
Mingshen Wu, Weihu Hong