Sciweavers

217 search results - page 36 / 44
» Selecting Cryptographic Key Sizes
Sort
View
CPHYSICS
2007
65views more  CPHYSICS 2007»
13 years 8 months ago
Plasma etching and feature evolution of organic low-k material by using VicAddress
Plasma process is a highly selective technique exploiting the individual or mixed function of positive ions, electrons, neutral radicals, and photons produced by low temperature p...
T. Makabe, T. Shimada, T. Yagisawa
DEBU
2007
141views more  DEBU 2007»
13 years 8 months ago
Issues in Building Practical Provenance Systems
The importance of maintaining provenance has been widely recognized, particularly with respect to highly-manipulated data. However, there are few deployed databases that provide p...
Adriane Chapman, H. V. Jagadish
PRL
2008
213views more  PRL 2008»
13 years 8 months ago
Boosting recombined weak classifiers
Boosting is a set of methods for the construction of classifier ensembles. The differential feature of these methods is that they allow to obtain a strong classifier from the comb...
Juan José Rodríguez, Jesús Ma...
FGCS
2000
81views more  FGCS 2000»
13 years 7 months ago
Managing the operator ordering problem in parallel databases
This paper focuses on parallel query optimization. We consider the operator problem and introduce a new class of execution strategies called Linear-Oriented Bushy Trees (LBTs). Co...
Harald Kosch
INFORMATICALT
2010
92views more  INFORMATICALT 2010»
13 years 6 months ago
New Fuzzy Identity-Based Encryption in the Standard Model
In a fuzzy identity-based encryption (IBE) scheme, a user with the secret key for an identity ID is able to decrypt a ciphertext encrypted with another identity ID if and only if I...
Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang