Sciweavers

1094 search results - page 145 / 219
» List signature schemes
Sort
View
ASIACRYPT
2003
Springer
13 years 11 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang
TC
1998
13 years 7 months ago
Optimal Zero-Aliasing Space Compaction of Test Responses
—Many built-in self-testing (BIST) schemes compress the test responses from a k-output circuit to q signature streams, where q << k, a process termed space compaction. The ...
Krishnendu Chakrabarty, Brian T. Murray, John P. H...
IPPS
2003
IEEE
14 years 29 days ago
Energy Aware Scheduling for Distributed Real-Time Systems
Power management has become popular in mobile computing as well as in server farms. Although a lot of work has been done to manage the energy consumption on uniprocessor real-time...
Ramesh Mishra, Namrata Rastogi, Dakai Zhu, Daniel ...
IADIS
2003
13 years 9 months ago
Versioning of E-Learning Objects Enabling Flexible Reuse
One promise that has always been made in the field of e-learning is the possibility to create and deliver learning material that is adaptable to individual learners. Realising thi...
Wolfgang Theilmann, Michael Altenhofen
WWW
2007
ACM
14 years 8 months ago
Using d-gap patterns for index compression
Sequential patterns of d-gaps exist pervasively in inverted lists of Web document collection indices due to the cluster property. In this paper the information of d-gap sequential...
Jinlin Chen, Terry Cook