Sciweavers

5675 search results - page 165 / 1135
» Exploiting Chaos for Computation
Sort
View
NPC
2005
Springer
15 years 10 months ago
Adaptive Query-Caching in Peer-to-Peer Systems
Peer-to-Peer (P2P) architectures are very prevalent in today’s Internet. Lots of P2P file sharing systems using Gnutella protocol emerge out and draw attractions of millions of p...
Zuoning Yin, Hai Jin, Chao Zhang, Quan Yuan, Chuch...
152
Voted
HRI
2010
ACM
15 years 10 months ago
Transparent active learning for robots
—This research aims to enable robots to learn from human teachers. Motivated by human social learning, we believe that a transparent learning process can help guide the human tea...
Crystal Chao, Maya Cakmak, Andrea Lockerd Thomaz
122
Voted
ICDM
2003
IEEE
140views Data Mining» more  ICDM 2003»
15 years 9 months ago
Mining Frequent Itemsets in Distributed and Dynamic Databases
Traditional methods for frequent itemset mining typically assume that data is centralized and static. Such methods impose excessive communication overhead when data is distributed...
Matthew Eric Otey, Chao Wang, Srinivasan Parthasar...
115
Voted
ISCAS
2003
IEEE
235views Hardware» more  ISCAS 2003»
15 years 9 months ago
Enhanced chaotic image encryption algorithm based on Baker's map
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of...
Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. I...
ASIACRYPT
2000
Springer
15 years 9 months ago
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
Abstract. Construction of secure hyperelliptic curves is of most important yet most difficult problem in design of cryptosystems based on the discrete logarithm problems on hyperel...
Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shig...