Sciweavers

24741 search results - page 4866 / 4949
» Virtual Network Computing
Sort
View
119
Voted
EUROCRYPT
2009
Springer
16 years 2 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
133
Voted
KDD
2009
ACM
227views Data Mining» more  KDD 2009»
16 years 2 months ago
User grouping behavior in online forums
Online forums represent one type of social media that is particularly rich for studying human behavior in information seeking and diffusing. The way users join communities is a re...
Xiaolin Shi, Jun Zhu, Rui Cai, Lei Zhang
121
Voted
KDD
2002
ACM
182views Data Mining» more  KDD 2002»
16 years 2 months ago
ANF: a fast and scalable tool for data mining in massive graphs
Graphs are an increasingly important data source, with such important graphs as the Internet and the Web. Other familiar graphs include CAD circuits, phone records, gene sequences...
Christopher R. Palmer, Phillip B. Gibbons, Christo...
114
Voted
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 2 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
160
Voted
VLSID
2002
IEEE
207views VLSI» more  VLSID 2002»
16 years 2 months ago
Synthesis of High Performance Low Power Dynamic CMOS Circuits
This paper presents a novel approach for the synthesis of dynamic CMOS circuits using Domino and Nora styles. As these logic styles can implement only non-inverting logic, convent...
Debasis Samanta, Nishant Sinha, Ajit Pal
« Prev « First page 4866 / 4949 Last » Next »