Sciweavers

261 search results - page 34 / 53
» Efficient Recovery in Harp
Sort
View
HPCS
2002
IEEE
14 years 2 months ago
CoStore: A Reliable and Highly Available Storage System Using Clusters
The CoStore cluster architecture has been proposed to construct a reliable and highly available storage system. A prototype CoStore has been implemented and its performance has be...
Yong Chen, Lionel M. Ni, Cheng-Zhong Xu, Mingyao Y...
CCS
2006
ACM
14 years 1 months ago
Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Fe...
DGCI
2008
Springer
13 years 11 months ago
A New Fuzzy Connectivity Class Application to Structural Recognition in Images
Fuzzy sets theory constitutes a poweful tool, that can lead to more robustness in problems such as image segmentation and recognition. This robustness results to some extent from t...
Olivier Nempont, Jamal Atif, Enrico Angelini, Isab...
BIOCOMP
2006
13 years 11 months ago
Learning Genetic and Gene Bayesian Networks with Hidden Variables: Bilayer Verification Algorithm
To improve the recovery of gene-gene and marker-gene (eQTL) interaction networks from microarray and genetic data, we propose a new procedure for learning Bayesian networks. This a...
Jason E. Aten
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 10 months ago
Restricted Isometries for Partial Random Circulant Matrices
In the theory of compressed sensing, restricted isometry analysis has become a standard tool for studying how efficiently a measurement matrix acquires information about sparse an...
Holger Rauhut, Justin K. Romberg, Joel A. Tropp