Sciweavers

1610 search results - page 255 / 322
» Identity Based Multisignatures
Sort
View
NDSS
2002
IEEE
14 years 3 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
BICOB
2010
Springer
14 years 3 months ago
Biological Relevance Detection via Network Dynamic Analysis
Most existing approaches for gene selection are based on evaluating the statistical relevance. However, there are remarkable discrepancies between statistical relevance and biolog...
Zheng Zhao, Huan Liu, Jiangxin Wang, Yung Chang
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
14 years 3 months ago
Estimation of arrival-departure capacity tradeoffs in multi-airport systems
Abstract— The accurate estimation of airport capacity is critical for the efficient planning of landing and takeoff operations, and the mitigation of congestion-induced delays. ...
Varun Ramanujam, Hamsa Balakrishnan
CSE
2009
IEEE
14 years 3 months ago
Processing Approximate Moving Range Queries in Mobile Sensor Environments
— The ubiquity of mobile devices has led to a rising demand for location-based services and applications. A major part of these services is based on the location-detection capabi...
Antoniya Petkova, Kien A. Hua, Alexander J. Aved
EDBT
2009
ACM
85views Database» more  EDBT 2009»
14 years 3 months ago
Expressive, yet tractable XML keys
Constraints are important for a variety of XML recommendations and applications. Consequently, there are numerous opportunities for advancing the treatment of XML semantics. In pa...
Sven Hartmann, Sebastian Link