Skip to main content

previous disabled Page of 15
and
Your search also matched 2,415 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Sibling intractable function families and their applications

Include preview-only content
  1. Chapter

    USD: Scalable Bandwidth Allocation for the Internet

    In this paper, we present a differentiated service scheme called “User-Share Differentiation (USD)”. The USD scheme is designed for long-term bandwidth allocation without per-session signaling. The scheme allo...

    Zheng Wang in High Performance Networking (1998)

  2. Chapter and Conference Paper

    Boosting trees for cost-sensitive classifications

    This paper explores two boosting techniques for cost-sensitive tree classifications in the situation where misclassification costs change very often. Ideally, one would like to have only one induction, and use...

    Kai Ming Ting, Zijian Zheng in Machine Learning: ECML-98 (1998)

  3. Chapter

    A Cut-Off Priority Flow Classification Policy for Data-Driven IP/ATM Switching Systems

    Flow classification is one of the key issues in the design of a data-driven IP/ATM switching system. To classify flows by applications is an effective approach in a real system due to its simplicity in impleme...

    Jun Zheng, Victor O. K. Li Fellow, IEEE in Broadband Communications (2000)

  4. Chapter

    Fair Bandwidth Allocation for Differentiated Services

    In this paper, we present a comparative study of three proposals for differentiated services — the RIO scheme, the two-bit scheme and the User-Share Differentiation (USD) scheme. We simulate the three schemes ...

    Anindya Basu, Zheng Wang in Protocols for High-Speed Networks VI (2000)

  5. Chapter and Conference Paper

    Unconditionally Secure Digital Signature Schemes Admitting Transferability

    A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new generation of computing devices ...

    Goichiro Hanaoka, Junji Shikata, Yuliang Zheng in Advances in Cryptology — ASIACRYPT 2000 (2000)

  6. Chapter and Conference Paper

    On Relationships among Avalanche, Nonlinearity, and Correlation Immunity

    We establish, for the first time, an explicit and simple lower bound on the nonlinearity N f of a Boolean function f of n variables satisfying the avalanche criterion of degree p, namely, Nf≥ 2n-1

    Yuliang Zheng, **an-Mo Zhang in Advances in Cryptology — ASIACRYPT 2000 (2000)

  7. Chapter and Conference Paper

    Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite

    Signcryption is a public key cryptographic primitive that fulfills the functions of digital signature and public key encryption concurrently, with a cost smaller than that required by the traditional signature...

    Yuliang Zheng in Public Key Cryptography (2001)

  8. Chapter and Conference Paper

    Efficient Verification of a Class of Linear Hybrid Automata Using Linear Programming

    In this paper, we show that for a class of linear hybrid automata called zero loop-closed automata, the satisfaction problem for linear duration properties can be solved efficiently by linear programming. We give...

    Li Xuandong, Pei Yu, Zhao Jianhua, Li Yong in Correct Hardware Design and Verification M… (2001)

  9. Chapter and Conference Paper

    Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions

    It has recently been shown that when m > 1/2n - 1, the nonlinearity N f of an mth-order correlation immune function f with n variables satisfies the condition of N

    Yuliang Zheng, **an-Mo Zhang in Selected Areas in Cryptography (2001)

  10. Chapter and Conference Paper

    Architecture of Generalized Network Service Anomaly and Fault Thresholds

    In this paper we introduce GAFT (Generalized Anomaly and Fault Threshold), featuring a novel system architecture that is capable of setting, monitoring and detecting generalized thresholds and soft faults proa...

    Zheng Zhang, Constantine Manikopoulos in Management of Multimedia on the Internet (2001)

  11. Chapter and Conference Paper

    IDSIS: Intelligent Document Semantic Indexing System

    With rapid growth of the Internet, how to get information from this huge information space becomes an even important problem. In this paper, An Intelligence Document Semantic Indexing System: IDSIS is proposed...

    Zhongzhi Shi, Bin Wu, Qing He, **ujun Gong in Intelligent Information Processing (2002)

  12. Chapter and Conference Paper

    Security Notions for Unconditionally Secure Signature Schemes

    This paper focuses on notions for the security of digital signature schemes whose resistance against forgery is not dependent on unproven computational assumptions. We establish successfully a sound and strong...

    Junji Shikata, Goichiro Hanaoka, Yuliang Zheng in Advances in Cryptology — EUROCRYPT 2002 (2002)

  13. Chapter

    DVQ: A DTD-Driven Visual Query Interface for XML Database Systems

    XML has been recognized as a promising language for data exchange over the Internet. A number of query languages have been proposed for querying XML data. Most of those languages are path-expression based. One...

    Long Zhang, Shihui Zheng, Aoying Zhou in Visual and Multimedia Information Manageme… (2002)

  14. Chapter and Conference Paper

    Interactive Deformation of Irregular Surface Models

    Interactive deformation of surface models, which consist of quadrilateral (regular) and non-quadrilateral (irregular) surface patches, arises in many applications of computer animation and computer aided produ...

    ** ** Zheng, Jian J. Zhang in Computational Science — ICCS 2002 (2002)

  15. Chapter and Conference Paper

    Stereo Matching Using Belief Propagation

    In this paper, we formulate the stereo matching problem as a Markov network consisting of three coupled Markov random fields (MRF’s). These three MRF’s model a smooth field for depth/disparity, a line process ...

    Jian Sun, Heung-Yeung Shum, Nan-Ning Zheng in Computer Vision — ECCV 2002 (2002)

  16. Chapter and Conference Paper

    Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code

    Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundatio...

    Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai in Public Key Cryptography (2002)

  17. Chapter and Conference Paper

    A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme

    Ring signature allows to specify a set of possible signers without revealing which member actually produced the signature. This concept was first formalized in 2001 by Rivest, Shamir, and Tauman[3]. Authors of...

    Chong-zhi Gao, Zheng-an Yao, Lei Li in Applied Cryptography and Network Security (2003)

  18. Chapter and Conference Paper

    Parallel Computing Method of Valuing for Multi-asset European Option

    A critical problem in Finance Engineering is to value the option and other derivatives securities correctly. The Monte Carlo method (MC) is an important one in the computation for the valuation of multiasset E...

    Weimin Zheng, Jiwu Shu, **atie Deng, Yonggen Gu in Computational Science — ICCS 2003 (2003)

  19. Chapter and Conference Paper

    Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts

    There are many applications for true, unpredictable random numbers. For example the strength of numerous cryptographic operations is often dependent on a source of truly random numbers. Sources of random infor...

    Michael Epstein, Laszlo Hars in Cryptographic Hardware and Embedded System… (2003)

  20. Chapter and Conference Paper

    Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc Networks

    In mobile ad hoc networks (MANET), nodes move freely and the replica allocation in such a dynamic environment is a significant challenge. In this paper, a dynamic adaptive replica allocation algorithm that can...

    Zheng **g, Su **shu, Yang Kan, Wang Yijie in Computational Science - ICCS 2004 (2004)

previous disabled Page of 15