Sciweavers

896 search results - page 157 / 180
» On completeness of word reversing
Sort
View
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
14 years 5 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
CTRSA
2009
Springer
128views Cryptology» more  CTRSA 2009»
14 years 3 months ago
Short Redactable Signatures Using Random Trees
Abstract. A redactable signature scheme for a string of objects supports verification even if multiple substrings are removed from the original string. It is important that the re...
Ee-Chien Chang, Chee Liang Lim, Jia Xu
NOCS
2009
IEEE
14 years 3 months ago
A GALS many-core heterogeneous DSP platform with source-synchronous on-chip interconnection network
This paper presents a many-core heterogeneous computational platform that employs a GALS compatible circuit-switched on-chip network. The platform targets streaming DSP and embedd...
Anh T. Tran, Dean Truong, Bevan M. Baas
MHCI
2009
Springer
14 years 3 months ago
Designing phrase builder: a mobile real-time query expansion interface
As users enter web queries, real-time query expansion (RTQE) interfaces offer suggestions based on an index garnered from query logs. In selecting a suggestion, users can potentia...
Tim Paek, Bongshin Lee, Bo Thiesson
OTM
2009
Springer
14 years 3 months ago
Ontology-Driven Provenance Management in eScience: An Application in Parasite Research
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in scientific applications to verify experime...
Satya Sanket Sahoo, D. Brent Weatherly, Raghava Mu...