Sciweavers

5196 search results - page 991 / 1040
» State of Application Assessment
Sort
View
EUROCRYPT
2004
Springer
14 years 2 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
IDEAL
2004
Springer
14 years 2 months ago
Combining Local and Global Models to Capture Fast and Slow Dynamics in Time Series Data
Many time series exhibit dynamics over vastly different time scales. The standard way to capture this behavior is to assume that the slow dynamics are a “trend”, to de-trend t...
Michael Small
SIGADA
2004
Springer
14 years 2 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
IPPS
2003
IEEE
14 years 2 months ago
GCA: A Massively Parallel Model
We had introduced the massively parallel global cellular automata (GCA) model. Parallel algorithms derived from applications can be mapped straight forward onto this model. In thi...
Rolf Hoffmann, Klaus-Peter Völkmann, Wolfgang...
ISCC
2003
IEEE
153views Communications» more  ISCC 2003»
14 years 2 months ago
Fuzzy Explicit Marking for Congestion Control in Differentiated Services Networks
This paper presents a new active queue management scheme, Fuzzy Explicit Marking (FEM), implemented within the differentiated services (Diff-Serv) framework to provide congestion ...
Chrysostomos Chrysostomou, Andreas Pitsillides, Ge...