Sciweavers

217 search results - page 42 / 44
» Selecting Cryptographic Key Sizes
Sort
View
CASES
2007
ACM
13 years 12 months ago
A simplified java bytecode compilation system for resource-constrained embedded processors
Embedded platforms are resource-constrained systems in which performance and memory requirements of executed code are of critical importance. However, standard techniques such as ...
Carmen Badea, Alexandru Nicolau, Alexander V. Veid...
CIMAGING
2009
192views Hardware» more  CIMAGING 2009»
13 years 9 months ago
Compressive coded aperture imaging
Nonlinear image reconstruction based upon sparse representations of images has recently received widespread attention with the emerging framework of compressed sensing (CS). This ...
Roummel F. Marcia, Zachary T. Harmany, Rebecca Wil...
DCC
2010
IEEE
13 years 8 months ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
DATAMINE
2006
127views more  DATAMINE 2006»
13 years 8 months ago
Computing LTS Regression for Large Data Sets
Least trimmed squares (LTS) regression is based on the subset of h cases (out of n) whose least squares t possesses the smallest sum of squared residuals. The coverage h may be se...
Peter Rousseeuw, Katrien van Driessen
CN
2007
114views more  CN 2007»
13 years 8 months ago
BiSNET: A biologically-inspired middleware architecture for self-managing wireless sensor networks
This paper describes BiSNET (Biologically-inspired architecture for Sensor NETworks), a middleware architecture that addresses several key issues in multi-modal wireless sensor ne...
Pruet Boonma, Junichi Suzuki