Sciweavers

7434 search results - page 1479 / 1487
» Still
Sort
View
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 2 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
CAISE
2004
Springer
14 years 23 days ago
Multi-Paradigm Process Management
Automation and integration of business processes are at the heart of contemporary enterprise systems. In the pursuit of this goal, process automation technology is employed at vary...
Michael zur Muehlen, Michael Rosemann
SIGCOMM
2012
ACM
11 years 9 months ago
NetPilot: automating datacenter network failure mitigation
The soaring demands for always-on and fast-response online services have driven modern datacenter networks to undergo tremendous growth. These networks often rely on scale-out des...
Xin Wu, Daniel Turner, Chao-Chih Chen, David A. Ma...
SIGCOMM
2012
ACM
11 years 9 months ago
TUBE: time-dependent pricing for mobile data
The two largest U.S. wireless ISPs have recently moved towards usage-based pricing to better manage the growing demand on their networks. Yet usage-based pricing still requires IS...
Sangtae Ha, Soumya Sen, Carlee Joe-Wong, Youngbin ...
JMLR
2012
11 years 9 months ago
Bounding the Probability of Error for High Precision Optical Character Recognition
We consider a model for which it is important, early in processing, to estimate some variables with high precision, but perhaps at relatively low recall. If some variables can be ...
Gary B. Huang, Andrew Kae, Carl Doersch, Erik G. L...
« Prev « First page 1479 / 1487 Last » Next »