• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 870
Next 10 →

Identity Based Online/Offline Signcryption Scheme

by S. Sharmila, Deva Selvi, S. Sree Vivek, U Rangan
"... Abstract. Online/Offline signcryption is a cryptographic primitive where the signcryption process is divided into two phases- online and offline phase. Most of the computations are carried out offline (where the message and the receiver identity are unavailable). The online phase does not require an ..."
Abstract - Add to MetaCart
Abstract. Online/Offline signcryption is a cryptographic primitive where the signcryption process is divided into two phases- online and offline phase. Most of the computations are carried out offline (where the message and the receiver identity are unavailable). The online phase does not require

Efficient Certificateless Online/Offline Signature

by S Sharmila , Deva Selvi , S Sree Vivek , Vivek Krishna Pradhan , C Pandu Rangan
"... Abstract Public key cryptography usually is computationally more expensive than symmetric key systems. Due to this low power or resource constrained devices cannot make use of public key cryptosystems easily. There is a need for high security in these devices since many of these devices perform com ..."
Abstract - Add to MetaCart
compromise the security of the users. Online/offline have two parts, first the computationally heavy part(offline) of the cryptosystem and then the main "online" algorithm for use on resource constrained devices. The heavy computations are done in the offline phase on a more powerful device. Hence

Identity Based Online/Offline Encryption Scheme

by Sharmila Deva Selvi S, Sree Vivek S, U Rangan C
"... Abstract. Consider the situation where a low power device with limited computational power has to perform cryptographic operation in order to do secure communication to the base station where the computational power is not limited. The most obvious way is to split each and every cryptographic operat ..."
Abstract - Add to MetaCart
encryption scheme proposed in ACNS 09 by Liu et al. [7]. The scheme in [7] is the first identity based online offline encryption scheme in the random oracle model, in which the message and recipient are not known during the offline phase. We show that this scheme is not CCA secure. We show the weakness

Offline Cursive Script Word Recognition -- a Survey

by Tal Steinherz, Ehud Rivlin, Nathan Intrator , 1999
"... We review the field of offline cursive word recognition. We mainly deal with the various methods that were proposed to realize the core of recognition in a word recognition system. These methods are discussed in view of the two most important properties of such a system: the size and nature of the l ..."
Abstract - Cited by 59 (3 self) - Add to MetaCart
We review the field of offline cursive word recognition. We mainly deal with the various methods that were proposed to realize the core of recognition in a word recognition system. These methods are discussed in view of the two most important properties of such a system: the size and nature

An Algorithm for Off-Line Detection of Phases in Execution Profiles

by Brian M. Carlson, Thomas D. Wagner - TECHNIQUES AND TOOLS, 7TH INTERNATIONAL CONFERENCE, G. HARING AND G. KOTSIS, EDS. LECTURE NOTES IN COMPUTER SCIENCE NO. 794 , 1994
"... This paper describes a method for the detection of phases in time-series data. The specific application considered is time-series data which describes an execution profile of a parallel program. The algorithm is described and examples are presented. This paper presents the problem in the broader sen ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
This paper describes a method for the detection of phases in time-series data. The specific application considered is time-series data which describes an execution profile of a parallel program. The algorithm is described and examples are presented. This paper presents the problem in the broader

Offline Witness Encryption

by Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
"... Abstract. Witness encryption (WE) was introduced by Garg et al. (STOC’13). A WE scheme is defined for some NP language L and lets a sender encrypt messages relative to instances x. A ciphertext for x can be decrypted using w witnessing x ∈ L, but hides the message if x / ∈ L. Garg et al. construct W ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
time soon. We construct a WE scheme where encryption is done by simply computing a Naor-Yung ciphertext (two CPA encryptions and a NIZK proof). To achieve this, our scheme has a setup phase, which outputs public parameters containing an obfuscated circuit (only required for decryption), two encryption

Efficient analyses for realistic off-line partial evaluation

by Anders Bondorf, Jesper Jørgensen - Journal of Functional Programming , 1993
"... Based on Henglein’s efficient binding-time analysis for the lambda calculus (with constants and “fix”) [Hen91], we develop four efficient analyses for use in the preprocessing phase of Similix, a self-applicable partial evaluator for a higher-order subset of Scheme. The analyses developed in this pa ..."
Abstract - Cited by 50 (1 self) - Add to MetaCart
Based on Henglein’s efficient binding-time analysis for the lambda calculus (with constants and “fix”) [Hen91], we develop four efficient analyses for use in the preprocessing phase of Similix, a self-applicable partial evaluator for a higher-order subset of Scheme. The analyses developed

Automatic Extraction of Tempo and Beat from Expressive Performances

by Simon Dixon - Journal of New Music Research , 2001
"... We describe a computer program which is able to estimate the tempo and the times of musical beats in expressively performed music. The input data may be either digital audio or a symbolic representation of music such as MIDI. The data is processed off-line to detect the salient rhythmic events and t ..."
Abstract - Cited by 193 (27 self) - Add to MetaCart
We describe a computer program which is able to estimate the tempo and the times of musical beats in expressively performed music. The input data may be either digital audio or a symbolic representation of music such as MIDI. The data is processed off-line to detect the salient rhythmic events

Decomposable negation normal form

by Adnan Darwiche - JOURNAL OF THE ACM , 2001
"... Knowledge compilation has been emerging recently as a new direction of research for dealing with the computational intractability of general propositional reasoning. According to this approach, the reasoning process is split into two phases: an off-line compilation phase and an online query-answer ..."
Abstract - Cited by 128 (17 self) - Add to MetaCart
Knowledge compilation has been emerging recently as a new direction of research for dealing with the computational intractability of general propositional reasoning. According to this approach, the reasoning process is split into two phases: an off-line compilation phase and an online query

EFFICIENT REDUCED MODELS FOR PARAMETRIZED DYNAMICAL SYSTEMS BY OFFLINE/ONLINE DECOMPOSITION

by Bernard Haasdonk, Mario Ohlberger, Westfälische Wilhelms-universität Münster, Corresponding Bernard Haasdonk
"... Abstract. Reduced basis (RB) methods are effective methods for model reduction of parametrized partial differential equations (P2DEs). During the last years various types of stationary and timedependent, linear and nonlinear P2DEs have been treated. In the field of dynamical systems ’ order reductio ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
systems with output estimation. A so called offline/online decomposition is the key for efficient simulation: In the offline phase, one prepares the reduced basis and auxiliary parameter-independent quantities. These preparations allow rapid online simulations for varying parameters. The possibly
Next 10 →
Results 1 - 10 of 870
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University