Resource Type

A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption (open access)

A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption

This article proposes a novel encryption schema based on Elliptic Curve Cyrptography (ECC) and homomorphic encryption to secure data transmission in wireless sensor networks.
Date: December 7, 2015
Creator: Elhoseny, Mohamed; Elminir, Hamdy; Riad, Alaa & Yuan, Xiaohui
System: The UNT Digital Library
Inferring Temporally-Anchored Spatial Knowledge from Semantic Roles (open access)

Inferring Temporally-Anchored Spatial Knowledge from Semantic Roles

This paper presents a framework to infer spatial knowledge from verbal semantic role representations.
Date: June 2015
Creator: Blanco, Eduardo & Vempala, Alakananda
System: The UNT Digital Library
Solving the (n² - 1)-Puzzle with 8/3 n³ Expected Moves (open access)

Solving the (n² - 1)-Puzzle with 8/3 n³ Expected Moves

In this article, it is shown that the greedy algorithm for the (n² - 1)-puzzle makes 8/3 + O(n²) expected moves. This analysis is verified experimentally on 10,000 random instances each of the (n² - 1)-puzzle for 4 ≤ n ≤ 200.
Date: July 10, 2015
Creator: Parberry, Ian
System: The UNT Digital Library