Sciweavers

1064 search results - page 168 / 213
» Single Tree Grammars
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
15 years 1 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
120
Voted
BMCBI
2010
164views more  BMCBI 2010»
15 years 3 months ago
Pan-genome sequence analysis using Panseq: an online tool for the rapid analysis of core and accessory genomic regions
Background: The pan-genome of a bacterial species consists of a core and an accessory gene pool. The accessory genome is thought to be an important source of genetic variability i...
Chad Laing, Cody Buchanan, Eduardo N. Taboada, Yon...
117
Voted
ICCAD
2001
IEEE
84views Hardware» more  ICCAD 2001»
16 years 9 days ago
Minimum-Buffered Routing of Non-Critical Nets for Slew Rate and Reliability Control
In high-speed digital VLSI design, bounding the load capacitance at gate outputs is a well-known methodology to improve coupling noise immunity, reduce degradation of signal trans...
Charles J. Alpert, Andrew B. Kahng, Bao Liu, Ion I...
APWEB
2005
Springer
15 years 9 months ago
Indexing Text and Visual Features for WWW Images
In this paper, we present a novel indexing technique called Multi-scale Similarity Indexing (MSI) to index image’s multi-features into a single one-dimensional structure. Both f...
Heng Tao Shen, Xiaofang Zhou, Bin Cui
120
Voted
ICNP
1998
IEEE
15 years 7 months ago
Digital Signatures for Flows and Multicasts
We present chaining techniques for signing/verifying multiple packets using a single signing/verification operation. We then present flow signing and verification procedures based...
Chung Kei Wong, Simon S. Lam