Sciweavers

662 search results - page 58 / 133
» Heart vs. Model
Sort
View
PKDD
2010
Springer
150views Data Mining» more  PKDD 2010»
13 years 6 months ago
Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms
Given a contact network that changes over time (say, day vs night connectivity), and the SIS (susceptible/infected/susceptible, flu like) virus propagation model, what can we say ...
B. Aditya Prakash, Hanghang Tong, Nicholas Valler,...
ISBI
2006
IEEE
14 years 8 months ago
An algebraic solution to rigid registration of diffusion tensor images
We present an algebraic solution to direct registration of diffusion tensor images under various local deformation models. We show how to linearly recover the deformation from the...
Alvina Goh, René Vidal
ACISP
2005
Springer
14 years 1 months ago
Dynamic Group Key Agreement in Tree-Based Setting
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Ratna Dutta, Rana Barua
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
13 years 9 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
GI
2008
Springer
13 years 8 months ago
Semi-Automatic Ontology Engineering in Business Applications
: Search technology can be applied to many applications and is in the heart of always growing information society. A promising new development is the use of ontologies to enable se...
Felix Burkhardt, Jon Atle Gulla, Jin Liu, Christia...