Sciweavers

1416 search results - page 55 / 284
» cost 2009
Sort
View
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
14 years 7 days ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
GSN
2009
Springer
155views Sensor Networks» more  GSN 2009»
13 years 11 months ago
Distributed Network Configuration for Wavelet-Based Compression in Sensor Networks
En-route data compression is fundamental to reduce the power consumed for data gathering in sensor networks. Typical in-network compression schemes involve the distributed computat...
Paula Tarrío, Giuseppe Valenzise, Godwin Sh...
ICWS
2009
IEEE
13 years 5 months ago
DHT-Based Range Query Processing for Web Service Discovery
DHTs are scalable, self-organizing, and adaptive to underlying topology changes, thus being a promising infrastructure for realizing efficient Web service discovery. Range queries...
Yiming Zhang, Ling Liu, Dongsheng Li, Feng Liu, Xi...
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 2 months ago
Upper Bounds for Maximally Greedy Binary Search Trees
At SODA 2009, Demaine et al. presented a novel connection between binary search trees (BSTs) and subsets of points on the plane. This connection was independently discovered by Der...
Kyle Fox
ASAP
2009
IEEE
80views Hardware» more  ASAP 2009»
14 years 4 months ago
Specialization of the Cell SPE for Media Applications
— There is a clear trend towards multi-cores to meet the performance requirements of emerging and future applications. A different way to scale performance is, however, to specia...
Cor Meenderinck, Ben H. H. Juurlink