Sciweavers

25538 search results - page 5093 / 5108
» Explanation in Information Systems
Sort
View
ICDCS
2010
IEEE
13 years 4 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
IJRR
2010
153views more  IJRR 2010»
13 years 4 months ago
Cooperative AUV Navigation using a Single Maneuvering Surface Craft
This paper describes the experimental implementation of an online algorithm for cooperative localization of submerged autonomous underwater vehicles (AUVs) supported by an autonom...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
AISS
2010
146views more  AISS 2010»
13 years 2 months ago
Zatara, the Plug-in-able Eventually Consistent Distributed Database
With the proliferation of the computer Cloud, new software delivery methods were created. In order to build software to fit into one of these models, a scalable, easy to deploy st...
Bogdan Carstoiu, Dorin Carstoiu
BMCBI
2010
223views more  BMCBI 2010»
13 years 2 months ago
MetNetGE: interactive views of biological networks and ontologies
Background: Linking high-throughput experimental data with biological networks is a key step for understanding complex biological systems. Currently, visualization tools for large...
Ming Jia, Suh-Yeon Choi, Dirk Reiners, Eve Syrkin ...
« Prev « First page 5093 / 5108 Last » Next »