Sciweavers

11455 search results - page 14 / 2291
» The Rayset and Its Applications
Sort
View
ASIACRYPT
2005
Springer
14 years 1 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
ICIP
2010
IEEE
13 years 5 months ago
A novel V-line Radon transform and its imaging applications
The Radon transform (RT) on straight lines deals as mathematical foundation for many tomographic modalities (e.g. Xray scanner, Positron Emission Tomography), using only primary r...
Marcela Morvidone, Tuong T. Truong, Mai K. Nguyen,...
IPPS
2010
IEEE
13 years 4 months ago
A simple thermal model for multi-core processors and its application to slack allocation
Abstract--Power density and heat density of multicore processor system are increasing exponentially with Moore's Law. High temperature on chip greatly affects its reliability,...
Zhe Wang, Sanjay Ranka
LPAR
2005
Springer
14 years 1 months ago
A New Constraint Solver for 3D Lattices and Its Application to the Protein Folding Problem
Abstract. The paper describes the formalization and implementation of an efficient constraint programming framework operating on 3D crystal lattices. The framework is motivated an...
Alessandro Dal Palù, Agostino Dovier, Enric...
ICCNMC
2005
Springer
14 years 1 months ago
Improved Thumbprint and Its Application for Intrusion Detection
This paper proposes RTT-thumbprint to traceback intruders, and to detect stepping-stone intrusion; RTT-thumbprint is a sequence of timestamp pairs of a send packet and its correspo...
Jianhua Yang, Shou-Hsuan Stephen Huang