Showing results 1 to 12 of 12
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
A privacy-preserving encryption scheme for an internet real-name registration system Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | |||
An Intelligent Self-Driving Truck System for Highway Transportation Journal:Frontiers in Neurorobotics | 2022 | |||
Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud Proceeding/Conference:Conference on Digital Forensics, Security, and Law | 2012 | 60 | ||
Compact Ring Signature in the Standard Model for Blockchain Proceeding/Conference:Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings | 2018 | 38 | ||
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model Proceeding/Conference:Lecture Notes in Computer Science | 2012 | 84 | ||
Everest: A Top-K Deep Video Analytics System Proceeding/Conference:Proceedings of the 2022 International Conference on Management of Data (SIGMOD 2022) | 2022 | |||
Non-claairvoyant scheduling for weighted flow time and energy on speed bounded processors Proceeding/Conference:Proceedings of the 16th Computing: The Australasian Theory Symposium | 2010 | 109 | ||
Non-clairvoyant scheduling for weighted flow time and energy on speed bounded processors Journal:Chicago Journal of Theoretical Computer Science | 2011 | 143 | ||
A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography Proceeding/Conference:Lecture Notes in Engineering and Computer Science | 2013 | 290 | ||
2020 | 23 | |||
Top-K Deep Video Analytics Proceeding/Conference:SIGMOD '21: Proceedings of the 2021 International Conference on Management of Data | 2021 | 3 | ||
Voronoi-based nearest neighbor search for multi-dimensional uncertain databases Proceeding/Conference:International Conference on Data Engineering Proceedings | 2013 | 56 |