Sciweavers

1720 search results - page 208 / 344
» Unranking Combinations in Parallel
Sort
View
COLCOM
2007
IEEE
15 years 11 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
142
Voted
COLCOM
2007
IEEE
15 years 11 months ago
SemCW: Semantic collaborative writing using RST
—During collaborative writing each author works on a copy of the shared document. These copies are then merged to produce the final document. This asynchronous work is supported...
Charbel Rahhal, Hala Skaf-Molli, Pascal Molli, Nis...
117
Voted
ICDAR
2007
IEEE
15 years 11 months ago
Hybrid Mathematical Symbol Recognition Using Support Vector Machines
Recognition of mathematical symbols is a challenging task, with a large set with many similar symbols. We present a support vector machine based hybrid recognition system that use...
Birendra Keshari, Stephen M. Watt
ICDCSW
2007
IEEE
15 years 11 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
IEEEPACT
2007
IEEE
15 years 11 months ago
Verification-Aware Microprocessor Design
The process of verifying a new microprocessor is a major problem for the computer industry. Currently, architects design processors to be fast, power-efficient, and reliable. Howe...
Anita Lungu, Daniel J. Sorin