Sciweavers

3771 search results - page 62 / 755
» Subobject Transformation Systems
Sort
View
107
Voted
PAIRING
2007
Springer
134views Cryptology» more  PAIRING 2007»
15 years 8 months ago
Proxy Re-encryption Systems for Identity-Based Encryption
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret ...
Toshihiko Matsuo
ICASSP
2010
IEEE
15 years 2 months ago
Source-domain adaptive filtering for MIMO systems with application to acoustic echo cancellation
Combining the channels of a multiple input/multiple output (MIMO) system into suitably chosen modes by a domain transformation offers great improvements of adaptive filtering alg...
Karim Helwani, Herbert Buchner, Sascha Spors
JRTIP
2007
108views more  JRTIP 2007»
15 years 2 months ago
Real-time hardware acceleration of the trace transform
The trace transform is a novel algorithm that has been shown to be effective in a number of image recognition tasks. It is a generalisation of the Radon transform that has been wid...
Suhaib A. Fahmy, Christos-Savvas Bouganis, Peter Y...
PVLDB
2010
168views more  PVLDB 2010»
15 years 28 days ago
Transforming XML Documents as Schemas Evolve
Database systems often use XML schema to describe the format of valid XML documents. Usually, this format is determined when the system is designed. Sometimes, in an already funct...
Jarek Gryz, Marcin Kwietniewski, Stephanie Hazlewo...
ICDCS
2010
IEEE
15 years 1 months ago
Fault-Containing Self-Stabilization in Asynchronous Systems with Constant Fault-Gap
This paper presents a new transformation which adds fault-containment properties to any silent self-stabilizing protocol. The transformation features a constant slow-down factor a...
Sven Köhler, Volker Turau