Sciweavers

3732 search results - page 711 / 747
» Ubiquitous Computing for the Public
Sort
View
FCCM
2005
IEEE
132views VLSI» more  FCCM 2005»
14 years 3 months ago
Hardware Factorization Based on Elliptic Curve Method
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factorization large integers is ...
Martin Simka, Jan Pelzl, Thorsten Kleinjung, Jens ...
JCDL
2005
ACM
111views Education» more  JCDL 2005»
14 years 3 months ago
Digitization and 3D modeling of movable books
Movable books provide interesting challenges for digitization and user interfaces design. We report in this paper some preliminary results in the building of a 3D visualization wo...
Pierre Cubaud, Jérôme Dupire, Alexand...
SIGMETRICS
2005
ACM
100views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
On AS-level path inference
The ability to discover the AS-level path between two end-points is valuable for network diagnosis, performance optimization, and reliability enhancement. Virtually all existing t...
Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang
CCS
2005
ACM
14 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
CIKM
2005
Springer
14 years 3 months ago
Internet scale string attribute publish/subscribe data networks
With this work we aim to make a three-fold contribution. We first address the issue of supporting efficiently queries over string-attributes involving prefix, suffix, containmen...
Ioannis Aekaterinidis, Peter Triantafillou