Sciweavers

10805 search results - page 2154 / 2161
» Mapping Computation with No Memory
Sort
View
SCN
2010
Springer
144views Communications» more  SCN 2010»
15 years 1 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
TVCG
2010
147views more  TVCG 2010»
15 years 1 months ago
Superquadric Glyphs for Symmetric Second-Order Tensors
—Symmetric second-order tensor fields play a central role in scientific and biomedical studies as well as in image analysis and feature-extraction methods. The utility of displ...
Thomas Schultz, Gordon L. Kindlmann
154
Voted
WABI
2010
Springer
178views Bioinformatics» more  WABI 2010»
15 years 1 months ago
Haplotype Inference on Pedigrees with Recombinations and Mutations
Abstract. Haplotype Inference (HI) is a computational challenge of crucial importance in a range of genetic studies, such as functional genomics, pharmacogenetics and population ge...
Yuri Pirola, Paola Bonizzoni, Tao Jiang
CONSTRAINTS
2010
153views more  CONSTRAINTS 2010»
15 years 20 days ago
Philosophy of the MiniZinc challenge
MiniZinc arose as a response to the extended discussion at CP2006 of the need for a standard modelling language for CP. This is a challenging problem, and we believe MiniZinc makes...
Peter J. Stuckey, Ralph Becket, Julien Fischer
164
Voted
DKE
2010
167views more  DKE 2010»
15 years 19 days ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
« Prev « First page 2154 / 2161 Last » Next »