Sciweavers

6251 search results - page 1078 / 1251
» Randomness, Computability, and Density
Sort
View
ASIACRYPT
2000
Springer
15 years 8 months ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
178
Voted
DAWAK
2000
Springer
15 years 8 months ago
COFE: A Scalable Method for Feature Extraction from Complex Objects
Abstract. Feature Extraction, also known as Multidimensional Scaling, is a basic primitive associated with indexing, clustering, nearest neighbor searching and visualization. We co...
Gabriela Hristescu, Martin Farach-Colton
MM
1999
ACM
117views Multimedia» more  MM 1999»
15 years 8 months ago
NAIVE - network aware Internet video encoding
The distribution of digital video content over computer networks has become commonplace. Unfortunately, most digital video encoding standards do not degrade gracefully in the face...
Héctor M. Briceño, Steven J. Gortler...
126
Voted
RTCSA
1999
IEEE
15 years 8 months ago
Bandwidth Reservation for Real Time Traffic in Wireless Mobile Environment
This study proposes a new bandwidth reservation strategy (Two Level Guarantee) in wireless environment based on the user mobility specification which is assumed to be given at cal...
Byung-Kyu Choi, Riccardo Bettati
AI
1998
Springer
15 years 8 months ago
A Heuristic Incremental Modeling Approach to Course Timetabling
Abstract. The general timetabling problem is an assignment of activities to xed time intervals, adhering to a prede ned set of resource availabilities. Timetabling problems are di ...
Don Banks, Peter van Beek, Amnon Meisels
« Prev « First page 1078 / 1251 Last » Next »