Results 1 - 10
of
870
Identity Based Online/Offline Signcryption Scheme
"... Abstract. Online/Offline signcryption is a cryptographic primitive where the signcryption process is divided into two phases- online and offline phase. Most of the computations are carried out offline (where the message and the receiver identity are unavailable). The online phase does not require an ..."
Abstract
- Add to MetaCart
Abstract. Online/Offline signcryption is a cryptographic primitive where the signcryption process is divided into two phases- online and offline phase. Most of the computations are carried out offline (where the message and the receiver identity are unavailable). The online phase does not require
Efficient Certificateless Online/Offline Signature
"... Abstract Public key cryptography usually is computationally more expensive than symmetric key systems. Due to this low power or resource constrained devices cannot make use of public key cryptosystems easily. There is a need for high security in these devices since many of these devices perform com ..."
Abstract
- Add to MetaCart
compromise the security of the users. Online/offline have two parts, first the computationally heavy part(offline) of the cryptosystem and then the main "online" algorithm for use on resource constrained devices. The heavy computations are done in the offline phase on a more powerful device. Hence
Identity Based Online/Offline Encryption Scheme
"... Abstract. Consider the situation where a low power device with limited computational power has to perform cryptographic operation in order to do secure communication to the base station where the computational power is not limited. The most obvious way is to split each and every cryptographic operat ..."
Abstract
- Add to MetaCart
encryption scheme proposed in ACNS 09 by Liu et al. [7]. The scheme in [7] is the first identity based online offline encryption scheme in the random oracle model, in which the message and recipient are not known during the offline phase. We show that this scheme is not CCA secure. We show the weakness
Offline Cursive Script Word Recognition -- a Survey
, 1999
"... We review the field of offline cursive word recognition. We mainly deal with the various methods that were proposed to realize the core of recognition in a word recognition system. These methods are discussed in view of the two most important properties of such a system: the size and nature of the l ..."
Abstract
-
Cited by 59 (3 self)
- Add to MetaCart
We review the field of offline cursive word recognition. We mainly deal with the various methods that were proposed to realize the core of recognition in a word recognition system. These methods are discussed in view of the two most important properties of such a system: the size and nature
An Algorithm for Off-Line Detection of Phases in Execution Profiles
- TECHNIQUES AND TOOLS, 7TH INTERNATIONAL CONFERENCE, G. HARING AND G. KOTSIS, EDS. LECTURE NOTES IN COMPUTER SCIENCE NO. 794
, 1994
"... This paper describes a method for the detection of phases in time-series data. The specific application considered is time-series data which describes an execution profile of a parallel program. The algorithm is described and examples are presented. This paper presents the problem in the broader sen ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
This paper describes a method for the detection of phases in time-series data. The specific application considered is time-series data which describes an execution profile of a parallel program. The algorithm is described and examples are presented. This paper presents the problem in the broader
Offline Witness Encryption
"... Abstract. Witness encryption (WE) was introduced by Garg et al. (STOC’13). A WE scheme is defined for some NP language L and lets a sender encrypt messages relative to instances x. A ciphertext for x can be decrypted using w witnessing x ∈ L, but hides the message if x / ∈ L. Garg et al. construct W ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
time soon. We construct a WE scheme where encryption is done by simply computing a Naor-Yung ciphertext (two CPA encryptions and a NIZK proof). To achieve this, our scheme has a setup phase, which outputs public parameters containing an obfuscated circuit (only required for decryption), two encryption
Efficient analyses for realistic off-line partial evaluation
- Journal of Functional Programming
, 1993
"... Based on Henglein’s efficient binding-time analysis for the lambda calculus (with constants and “fix”) [Hen91], we develop four efficient analyses for use in the preprocessing phase of Similix, a self-applicable partial evaluator for a higher-order subset of Scheme. The analyses developed in this pa ..."
Abstract
-
Cited by 50 (1 self)
- Add to MetaCart
Based on Henglein’s efficient binding-time analysis for the lambda calculus (with constants and “fix”) [Hen91], we develop four efficient analyses for use in the preprocessing phase of Similix, a self-applicable partial evaluator for a higher-order subset of Scheme. The analyses developed
Automatic Extraction of Tempo and Beat from Expressive Performances
- Journal of New Music Research
, 2001
"... We describe a computer program which is able to estimate the tempo and the times of musical beats in expressively performed music. The input data may be either digital audio or a symbolic representation of music such as MIDI. The data is processed off-line to detect the salient rhythmic events and t ..."
Abstract
-
Cited by 193 (27 self)
- Add to MetaCart
We describe a computer program which is able to estimate the tempo and the times of musical beats in expressively performed music. The input data may be either digital audio or a symbolic representation of music such as MIDI. The data is processed off-line to detect the salient rhythmic events
Decomposable negation normal form
- JOURNAL OF THE ACM
, 2001
"... Knowledge compilation has been emerging recently as a new direction of research for dealing with the computational intractability of general propositional reasoning. According to this approach, the reasoning process is split into two phases: an off-line compilation phase and an online query-answer ..."
Abstract
-
Cited by 128 (17 self)
- Add to MetaCart
Knowledge compilation has been emerging recently as a new direction of research for dealing with the computational intractability of general propositional reasoning. According to this approach, the reasoning process is split into two phases: an off-line compilation phase and an online query
EFFICIENT REDUCED MODELS FOR PARAMETRIZED DYNAMICAL SYSTEMS BY OFFLINE/ONLINE DECOMPOSITION
"... Abstract. Reduced basis (RB) methods are effective methods for model reduction of parametrized partial differential equations (P2DEs). During the last years various types of stationary and timedependent, linear and nonlinear P2DEs have been treated. In the field of dynamical systems ’ order reductio ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
systems with output estimation. A so called offline/online decomposition is the key for efficient simulation: In the offline phase, one prepares the reduced basis and auxiliary parameter-independent quantities. These preparations allow rapid online simulations for varying parameters. The possibly
Results 1 - 10
of
870