Sciweavers

22193 search results - page 66 / 4439
» Multiple Restricted Multiplication
Sort
View
HPDC
1998
IEEE
15 years 6 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
FSE
2006
Springer
116views Cryptology» more  FSE 2006»
15 years 6 months ago
On Feistel Structures Using a Diffusion Switching Mechanism
We study a recently proposed design approach of Feistel structure which employs diffusion matrices in a switching way. At ASIACRYPT 2004, Shirai and Preneel have proved that large ...
Taizo Shirai, Kyoji Shibutani
DEBS
2008
ACM
15 years 4 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
121
Voted
DBSEC
2008
115views Database» more  DBSEC 2008»
15 years 3 months ago
P4A: A New Privacy Model for XML
Abstract. We propose a new privacy model for XML data called Privacy for All (P4A) to capture collectors privacy practice and data providers privacy preferences. Through P4A data c...
Angela Cristina Duta, Ken Barker
UAI
2004
15 years 3 months ago
Convolutional Factor Graphs as Probabilistic Models
Based on a recent development in the area of error control coding, we introduce the notion of convolutional factor graphs (CFGs) as a new class of probabilistic graphical models. ...
Yongyi Mao, Frank R. Kschischang, Brendan J. Frey