Sciweavers

3328 search results - page 631 / 666
» On Plateaued Functions and Their Constructions
Sort
View
CLUSTER
2002
IEEE
14 years 18 days ago
Leveraging Standard Core Technologies to Programmatically Build Linux Cluster Appliances
Clusters have made the jump from lab prototypes to fullfledged production computing platforms. The number, variety, and specialized configurations of these machines are increasi...
Mason J. Katz, Philip M. Papadopoulos, Greg Bruno
SSIAI
2002
IEEE
14 years 16 days ago
Active Contours for Cell Tracking
This paper introduces an active contour or snakebased method for tracking cells within a video sequence. Specifically, we apply our cell tracking techniques to rolling leukocytes ...
Nilanjan Ray, Scott T. Acton
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
14 years 14 days ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
14 years 13 days ago
Active knowledge: dynamically enriching RDF knowledge bases by web services
The proliferation of knowledge-sharing communities and the advances in information extraction have enabled the construction of large knowledge bases using the RDF data model to re...
Nicoleta Preda, Gjergji Kasneci, Fabian M. Suchane...
EUROCRYPT
2010
Springer
14 years 13 days ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...