Sciweavers

844 search results - page 144 / 169
» Building Adaptive Systems with Service Composition Framework...
Sort
View
EUROCRYPT
2010
Springer
15 years 9 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
KDD
2010
ACM
289views Data Mining» more  KDD 2010»
15 years 2 months ago
Exploitation and exploration in a performance based contextual advertising system
The dynamic marketplace in online advertising calls for ranking systems that are optimized to consistently promote and capitalize better performing ads. The streaming nature of on...
Wei Li 0010, Xuerui Wang, Ruofei Zhang, Ying Cui, ...
HPCN
1999
Springer
15 years 8 months ago
Data Intensive Distributed Computing; A Medical Application Example
Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data from around the world, as well as employing large-scale computation. The...
Jason Lee, Brian Tierney, William E. Johnston
FGCS
2000
143views more  FGCS 2000»
15 years 4 months ago
A data intensive distributed computing architecture for "Grid" applications
Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data from around the world, as well as employing large-scale computation. The...
Brian Tierney, William E. Johnston, Jason Lee, Mar...
PERCOM
2008
ACM
15 years 4 months ago
An Infrastructure for Developing Pervasive Learning Environments
This paper presents an infrastructure for developing problem-based pervasive learning environments. Building such environments necessitates having many autonomous components deali...
Sabine Graf, Kathryn MacCallum, Tzu-Chien Liu, Mai...