Sciweavers

JCST
2007
76views more  JCST 2007»
13 years 11 months ago
A Semi-Random Multiple Decision-Tree Algorithm for Mining Data Streams
Xuegang Hu, Pei-Pei Li, Xindong Wu, Gong-Qing Wu
JCST
2007
70views more  JCST 2007»
13 years 11 months ago
Server-Based Data Push Architecture for Multi-Processor Environments
Xian-He Sun, Surendra Byna, Yong Chen
JCST
2007
97views more  JCST 2007»
13 years 11 months ago
Improved Collision Attack on Hash Function MD5
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that ...
Jie Liang, Xue-Jia Lai
JCST
2007
61views more  JCST 2007»
13 years 11 months ago
Visual Simulation of Multiple Unmixable Fluids
Wen Zheng, Jun-Hai Yong, Jean-Claude Paul
JCST
2007
98views more  JCST 2007»
13 years 11 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
JCST
2007
87views more  JCST 2007»
13 years 11 months ago
3D Morphing Using Strain Field Interpolation
Han-Bing Yan, Shi-Min Hu, Ralph R. Martin
JCST
2007
151views more  JCST 2007»
13 years 11 months ago
Indexing Future Trajectories of Moving Objects in a Constrained Network
Abstract Advances in wireless sensor networks and positioning technologies enable new applications monitoring moving objects. Some of these applications, such as traffic managemen...
Ji-Dong Chen, Xiao-Feng Meng