Sciweavers

41938 search results - page 8282 / 8388
» Complex Systems Modeling
Sort
View
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
EDBT
2009
ACM
222views Database» more  EDBT 2009»
14 years 4 months ago
Data clouds: summarizing keyword search results over structured data
Keyword searches are attractive because they facilitate users searching structured databases. On the other hand, tag clouds are popular for navigation and visualization purposes o...
Georgia Koutrika, Zahra Mohammadi Zadeh, Hector Ga...
LCTRTS
2009
Springer
14 years 4 months ago
Synergistic execution of stream programs on multicores with accelerators
The StreamIt programming model has been proposed to exploit parallelism in streaming applications on general purpose multicore architectures. The StreamIt graphs describe task, da...
Abhishek Udupa, R. Govindarajan, Matthew J. Thazhu...
DATE
2009
IEEE
159views Hardware» more  DATE 2009»
14 years 4 months ago
Design and implementation of a database filter for BLAST acceleration
— BLAST is a very popular Computational Biology algorithm. Since it is computationally expensive it is a natural target for acceleration research, and many reconfigurable archite...
Panagiotis Afratis, Constantinos Galanakis, Euripi...
GLOBECOM
2009
IEEE
14 years 4 months ago
Random Linear Network Coding for Time-Division Duplexing: Field Size Considerations
Abstract— We study the effect of the field size on the performance of random linear network coding for time division duplexing channels proposed in [1]. In particular, we study ...
Daniel Enrique Lucani, Muriel Médard, Milic...
« Prev « First page 8282 / 8388 Last » Next »