Sciweavers

2316 search results - page 10 / 464
» How Asymmetric Is the Internet
Sort
View
IOR
2008
128views more  IOR 2008»
13 years 9 months ago
Promised Lead-Time Contracts Under Asymmetric Information
We study the important problem of how a supplier should optimally share the consequences of demand uncertainty (i.e., the cost of inventory excesses and shortages) with a retailer...
Holly Lutze, Özalp Özer
AFRICACRYPT
2009
Springer
13 years 7 months ago
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware
Graphics processing units (GPU) are increasingly being used for general purpose computing. We present implementations of large integer modular exponentiation, the core of public-ke...
Owen Harrison, John Waldron
ACSAC
2000
IEEE
14 years 2 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
CORR
2008
Springer
61views Education» more  CORR 2008»
13 years 10 months ago
Science mapping with asymmetrical paradigmatic proximity
We propose a series of methods to represent the evolution of a field of science at different levels: namely micro, meso and macro levels. We use a previously introduced asymmetric...
Jean-Philippe Cointet, David Chavalarias
BC
2002
85views more  BC 2002»
13 years 9 months ago
Spike propagation synchronized by temporally asymmetric Hebbian learning
Synchronously spiking neurons have been observed in the cerebral cortex and the hippocampus. In computer models, synchronous spike volleys may be propagated across appropriately co...
Roland E. Suri, Terrence J. Sejnowski