Sciweavers

217 search results - page 26 / 44
» Selecting Cryptographic Key Sizes
Sort
View
SENSYS
2003
ACM
14 years 1 months ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...
GRID
2005
Springer
14 years 1 months ago
Highly latency tolerant Gaussian elimination
Large latencies over WAN will remain an obstacle to running communication intensive parallel applications on Grid environments. This paper takes one of such applications, Gaussian...
Toshio Endo, Kenjiro Taura
WSC
2008
13 years 10 months ago
Implementable MSE-optimal dynamic partial-overlapping batch means estimators for steady-state simulations
Estimating the variance of the sample mean from a stochastic process is essential in assessing the quality of using the sample mean to estimate the population mean which is the fu...
Wheyming Tina Song, Mingchang Chih
CVPR
2008
IEEE
13 years 9 months ago
Off-axis aperture camera: 3D shape reconstruction and image restoration
In this paper we present a novel 3D surface and image reconstruction method based on the off-axis aperture camera. The key idea is to change the size or the 3-D location of the ap...
Qingxu Dou, Paolo Favaro
APPINF
2003
13 years 9 months ago
A Framework for the Analysis and Comparison of Hypermedia Design Methods
Due to increasing size and complexity of hypermedia and web applications, there is growing concern by how to develop quality, reusable and maintainable hypermedia systems. In fact...
Susana Montero, Paloma Díaz, Ignacio Aedo