Sciweavers

2587 search results - page 514 / 518
» Intrusion Tolerant Systems
Sort
View
JOC
2007
93views more  JOC 2007»
13 years 10 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
CGF
2002
149views more  CGF 2002»
13 years 10 months ago
Using Perceptual Texture Masking for Efficient Image Synthesis
Texture mapping has become indispensable in image synthesis as an inexpensive source of rich visual detail. Less obvious, but just as useful, is its ability to mask image errors d...
Bruce Walter, Sumanta N. Pattanaik, Donald P. Gree...
GPEM
2000
80views more  GPEM 2000»
13 years 10 months ago
Explanatory Analysis of the Metabolome Using Genetic Programming of Simple, Interpretable Rules
Genetic programming, in conjunction with advanced analytical instruments, is a novel tool for the investigation of complex biological systems at the whole-tissue level. In this stu...
Helen E. Johnson, Richard J. Gilbert, Michael K. W...
MICRO
2002
IEEE
156views Hardware» more  MICRO 2002»
13 years 10 months ago
TCP Switching: Exposing Circuits to IP
There has been much discussion about the best way to combine the benefits of new optical circuit switching technology with the established packet switched Internet. In this paper,...
Pablo Molinero-Fernández, Nick McKeown
PE
2002
Springer
150views Optimization» more  PE 2002»
13 years 10 months ago
Delimiting the range of effectiveness of scalable on-demand streaming
Previous analyses of scalable streaming protocols for delivery of stored multimedia have largely focused on how the server bandwidth required for full-file delivery scales as the ...
Haonan Tan, Derek L. Eager, Mary K. Vernon