Sciweavers

2290 search results - page 347 / 458
» Extensible Protected Types
Sort
View
143
Voted
ASIACRYPT
2005
Springer
15 years 8 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
ATAL
2005
Springer
15 years 8 months ago
How Bee-Like Agents Support Cultural Heritage
Abstract. Elderly people are a great repository of knowledge, the majority of which has never been gathered by formal means. In this paper we introduce an application of multi-agen...
Martí Fàbregas, Beatriz López...
FPL
2005
Springer
98views Hardware» more  FPL 2005»
15 years 8 months ago
Using DSP Blocks For ROM Replacement: A Novel Synthesis Flow
This paper describes a method based on polynomial approximation for transferring ROM resources used in FPGA designs to multiplication and addition operations. The technique can be...
Gareth W. Morris, George A. Constantinides, Peter ...
GECCO
2005
Springer
142views Optimization» more  GECCO 2005»
15 years 8 months ago
Genetic programming: parametric analysis of structure altering mutation techniques
We hypothesize that the relationship between parameter settings, speci cally parameters controlling mutation, and performance is non-linear in genetic programs. Genetic programmin...
Alan Piszcz, Terence Soule
ICALP
2005
Springer
15 years 8 months ago
Optimal Spaced Seeds for Faster Approximate String Matching
Filtering is a standard technique for fast approximate string matching in practice. In filtering, a quick first step is used to rule out almost all positions of a text as possib...
Martin Farach-Colton, Gad M. Landau, Süleyman...