Sciweavers

183 search results - page 25 / 37
» Beyond Being There
Sort
View
EUROCRYPT
2010
Springer
14 years 15 days ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
BMCBI
2010
122views more  BMCBI 2010»
13 years 7 months ago
Genome3D: A viewer-model framework for integrating and visualizing multi-scale epigenomic information within a three-dimensional
Background: New technologies are enabling the measurement of many types of genomic and epigenomic information at scales ranging from the atomic to nuclear. Much of this new data i...
Thomas M. Asbury, Matt Mitman, Jijun Tang, W. Jim ...
VIS
2007
IEEE
181views Visualization» more  VIS 2007»
14 years 9 months ago
Shadow-Driven 4D Haptic Visualization
Just as we can work with two-dimensional floor plans to communicate 3D architectural design, we can exploit reduced-dimension shadows to manipulate the higher-dimensional objects ...
Hui Zhang, Andrew J. Hanson
ISCA
2012
IEEE
279views Hardware» more  ISCA 2012»
11 years 10 months ago
Staged memory scheduling: Achieving high performance and scalability in heterogeneous systems
When multiple processor (CPU) cores and a GPU integrated together on the same chip share the off-chip main memory, requests from the GPU can heavily interfere with requests from t...
Rachata Ausavarungnirun, Kevin Kai-Wei Chang, Lava...
IPPS
2009
IEEE
14 years 2 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...