Sciweavers

734 search results - page 77 / 147
» Undecidability over Continuous Time
Sort
View
CSR
2009
Springer
14 years 3 months ago
A Feebly Secure Trapdoor Function
Abstract. In 1992, A. Hiltgen [1] provided the first constructions of provably (slightly) secure cryptographic primitives, namely feebly one-way functions. These functions are pro...
Edward A. Hirsch, Sergey I. Nikolenko
P2P
2008
IEEE
14 years 3 months ago
Transaction Rate Limiters for Peer-to-Peer Systems
We introduce transaction rate limiters, new mechanisms that limit (probabilistically) the maximum number of transactions a user of a peer-to-peer system can do in any given period...
Marcos Kawazoe Aguilera, Mark Lillibridge, Xiaozho...
ICDM
2007
IEEE
180views Data Mining» more  ICDM 2007»
14 years 3 months ago
Mining Frequent Itemsets in a Stream
We study the problem of finding frequent itemsets in a continuous stream of transactions. The current frequency of an itemset in a stream is defined as its maximal frequency ove...
Toon Calders, Nele Dexters, Bart Goethals
ICIW
2007
IEEE
14 years 3 months ago
An Open Tracing System for P2P File Sharing Systems
— This paper describes the Open P2P tracing system which aims to improve the research community’s understanding of P2P file sharing systems by providing continuous and up-todat...
Danny Hughes, James Walkerdine, Kevin Lee
IEEESCC
2007
IEEE
14 years 3 months ago
Specification of Adaptive Client-Tailored Product Models
Traditionally, product models often have a rigid nature, both with respect to the manner in which they are initially tailored to clients, and to the way they are maintained over t...
Tibor Bosse, Fiemke Both, Mark Hoogendoorn, Jan Tr...