Sciweavers

2028 search results - page 386 / 406
» Deriving Relation Keys from XML Keys
Sort
View
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
15 years 10 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
AUIC
2006
IEEE
15 years 9 months ago
Implementing a natural user interface for camera phones using visual tags
Pointing is a natural way of communicating. Children in all cultures use pointing inherently. Attaching tags to our environment enables interaction by pointing. Visual tags are a g...
Sanni Siltanen, Jouko Hyväkkä
BIBE
2006
IEEE
154views Bioinformatics» more  BIBE 2006»
15 years 9 months ago
Determining Molecular Similarity for Drug Discovery using the Wavelet Riemannian Metric
Discerning the similarity between two molecules is a challenging problem in drug discovery as well as in molecular biology. The importance of this problem is due to the fact that ...
Elinor Velasquez, Emmanuel R. Yera, Rahul Singh
151
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Placing Relay Nodes for Intra-Domain Path Diversity
Abstract— To increase reliability and robustness of missioncritical services in the face of routing changes, it is often desirable and beneficial to take advantage of path diver...
Meeyoung Cha, Sue B. Moon, Chong-Dae Park, Aman Sh...
123
Voted
IPPS
2006
IEEE
15 years 9 months ago
A simulation study of the effects of multi-path approaches in e-commerce applications
Response time is a key factor of any e-Commerce application, and a set of solutions have been proposed to provide low response time despite network congestions or failures. Being ...
Paolo Romano, Francesco Quaglia, Bruno Ciciani