Sciweavers

18374 search results - page 43 / 3675
» Applications for data hiding
Sort
View
CSB
2005
IEEE
210views Bioinformatics» more  CSB 2005»
14 years 3 months ago
Problem Solving Environment Approach to Integrating Diverse Biological Data Sources
Scientists face an ever-increasing challenge in investigating biological systems with high throughput experimental methods such as mass spectrometry and gene arrays because of the...
Eric G. Stephan, Kyle R. Klicker, Mudita Singhal, ...
HPCA
2011
IEEE
13 years 1 months ago
MOPED: Orchestrating interprocess message data on CMPs
Future CMPs will combine many simple cores with deep cache hierarchies. With more cores, cache resources per core are fewer, and must be shared carefully to avoid poor utilization...
Junli Gu, Steven S. Lumetta, Rakesh Kumar, Yihe Su...
SIGMOD
2007
ACM
188views Database» more  SIGMOD 2007»
14 years 9 months ago
Keyword search on relational data streams
Increasing monitoring of transactions, environmental parameters, homeland security, RFID chips and interactions of online users rapidly establishes new data sources and applicatio...
Alexander Markowetz, Yin Yang, Dimitris Papadias
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 8 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
NSDI
2010
13 years 11 months ago
Crom: Faster Web Browsing Using Speculative Execution
Early web content was expressed statically, making it amenable to straightforward prefetching to reduce userperceived network delay. In contrast, today's rich web application...
James Mickens, Jeremy Elson, Jon Howell, Jay Lorch