Sciweavers

2494 search results - page 314 / 499
» Dependable Distributed Computing Using Free Databases
Sort
View
STOC
1997
ACM
111views Algorithms» more  STOC 1997»
14 years 17 days ago
The Swendsen-Wang Process Does Not Always Mix Rapidly
The Swendsen-Wang process provides one possible dynamics for the Qstate Potts model in statistical physics. Computer simulations of this process are widely used to estimate the ex...
Vivek Gore, Mark Jerrum
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
KDD
2009
ACM
196views Data Mining» more  KDD 2009»
14 years 3 months ago
WhereNext: a location predictor on trajectory pattern mining
The pervasiveness of mobile devices and location based services is leading to an increasing volume of mobility data. This side effect provides the opportunity for innovative meth...
Anna Monreale, Fabio Pinelli, Roberto Trasarti, Fo...
ICPR
2006
IEEE
14 years 9 months ago
A fast binary-image comparison method with local-dissimilarity quantification
Image similarity measure is widely used in image processing. For binary images that are not composed of a single shape, a local comparison is interesting but the features are usel...
Etienne Baudrier, Frédéric Nicolier,...
SDMW
2004
Springer
14 years 1 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan