Sciweavers

3179 search results - page 224 / 636
» Applications of PCF Theory
Sort
View
PAMI
2012
12 years 25 days ago
M-Idempotent and Self-Dual Morphological Filters
—In this paper, we present a comprehensive analysis of self-dual and m-idempotent operators. We refer to an operator as m-idempotent if it converges after m iterations. We focus ...
Nidhal Bouaynaya, Mohammed Charif-Chefchaouni, Dan...
EUROCRYPT
2012
Springer
12 years 24 days ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
EDBT
2012
ACM
308views Database» more  EDBT 2012»
12 years 24 days ago
Transactional stream processing
Many stream processing applications require access to a multitude of streaming as well as stored data sources. Yet there is no clear semantics for correct continuous query executi...
Irina Botan, Peter M. Fischer, Donald Kossmann, Ne...
IPPS
2005
IEEE
14 years 4 months ago
Practical Divisible Load Scheduling on Grid Platforms with APST-DV
Divisible load applications consist of a load, that is input data and associated computation, that can be divided arbitrarily into independent pieces. Such applications arise in m...
Krijn van der Raadt, Yang Yang, Henri Casanova
ICMI
2005
Springer
107views Biometrics» more  ICMI 2005»
14 years 3 months ago
Exploring multimodality in the laboratory and the field
There are new challenges to us, as researchers, on how to design and evaluate new mobile applications because they give users access to powerful computing devices through small in...
Lynne Baillie, Raimund Schatz