Sciweavers

7924 search results - page 1562 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
CN
2008
127views more  CN 2008»
13 years 7 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
CORR
2010
Springer
196views Education» more  CORR 2010»
13 years 7 months ago
SWiM -- A Semantic Wiki for Mathematical Knowledge Management
Abstract. SWiM is a semantic wiki for collaboratively building, editing and browsing mathematical knowledge represented in the domainspecific structural semantic markup language OM...
Christoph Lange 0002
CORR
2010
Springer
186views Education» more  CORR 2010»
13 years 7 months ago
Capacitated Caching Games
Capacitated Caching (CC) Games are motivated by P2P and web caching applications, and involve nodes on a network making strategic choices regarding the content to replicate in the...
Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Na...
CORR
2008
Springer
148views Education» more  CORR 2008»
13 years 7 months ago
Copper Electrodeposition for 3D Integration
Abstract-Two dimensional (2D) integration has been the traditional approach for IC integration. Increasing demands for providing electronic devices with superior performance and fu...
Rozalia Beica, Charles Sharbono, Tom Ritzdorf
DCC
2010
IEEE
13 years 7 months ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
« Prev « First page 1562 / 1585 Last » Next »