Sciweavers

10805 search results - page 2154 / 2161
» Mapping Computation with No Memory
Sort
View
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 5 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
TVCG
2010
147views more  TVCG 2010»
13 years 5 months ago
Superquadric Glyphs for Symmetric Second-Order Tensors
—Symmetric second-order tensor fields play a central role in scientific and biomedical studies as well as in image analysis and feature-extraction methods. The utility of displ...
Thomas Schultz, Gordon L. Kindlmann
WABI
2010
Springer
178views Bioinformatics» more  WABI 2010»
13 years 5 months ago
Haplotype Inference on Pedigrees with Recombinations and Mutations
Abstract. Haplotype Inference (HI) is a computational challenge of crucial importance in a range of genetic studies, such as functional genomics, pharmacogenetics and population ge...
Yuri Pirola, Paola Bonizzoni, Tao Jiang
CONSTRAINTS
2010
153views more  CONSTRAINTS 2010»
13 years 4 months ago
Philosophy of the MiniZinc challenge
MiniZinc arose as a response to the extended discussion at CP2006 of the need for a standard modelling language for CP. This is a challenging problem, and we believe MiniZinc makes...
Peter J. Stuckey, Ralph Becket, Julien Fischer
DKE
2010
167views more  DKE 2010»
13 years 4 months ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
« Prev « First page 2154 / 2161 Last » Next »