Sciweavers

2125 search results - page 132 / 425
» Points with Type-2 Operations
Sort
View
114
Voted
ICICS
2004
Springer
15 years 8 months ago
Robust Metering Schemes for General Access Structures
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They sho...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
15 years 8 months ago
Architecture of a Mobile Internet
In this paper, we outline the next major evolution of the Internet architecture, where support for mobility is not the exception but the typical case. We show which parts of the I...
Dick Schefström
ICIAP
1999
ACM
15 years 7 months ago
Methods for Dynamic Classifier Selection
In the field of pattern recognition, the concept of Multiple Classifier Systems (MCSs) was proposed as a method for the development of high performance classification systems. At ...
Giorgio Giacinto, Fabio Roli
QCQC
1998
Springer
110views Communications» more  QCQC 1998»
15 years 7 months ago
The Hidden Subgroup Problem and Eigenvalue Estimation on a Quantum Computer
Abstract. A quantum computer can efficiently find the order of an element in a group, factors of composite integers, discrete logarithms, stabilisers in Abelian groups, and hidden ...
Michele Mosca, Artur Ekert
ICPP
1996
IEEE
15 years 7 months ago
On the Scalability of 2-D Wavelet Transform Algorithms on Fine-grained Parallel Machines
: We study the scalability of 2-D discrete wavelet transform algorithms on fine-grained parallel architectures. The principal operation in the 2-D DWT is the filtering operation us...
Jamshed N. Patel, Ashfaq A. Khokhar, Leah H. Jamie...