Sciweavers

1552 search results - page 307 / 311
» On the Complexity of Constant Propagation
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 5 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
TMI
2010
96views more  TMI 2010»
13 years 5 months ago
Statistics of Optical Coherence Tomography Data From Human Retina
—Optical coherence tomography (OCT) has recently become one of the primary methods for noninvasive probing of the human retina. The pseudoimage formed by OCT (the so-called B-sca...
Norberto M. Grzywacz, Joaquín de Juan, Clau...
WABI
2010
Springer
170views Bioinformatics» more  WABI 2010»
13 years 5 months ago
Haplotypes versus Genotypes on Pedigrees
Abstract. Genome sequencing will soon produce haplotype data for individuals. For pedigrees of related individuals, sequencing appears to be an attractive alternative to genotyping...
Bonnie Kirkpatrick
MM
2010
ACM
191views Multimedia» more  MM 2010»
13 years 5 months ago
Quantifying tag representativeness of visual content of social images
Social tags describe images from many aspects including the visual content observable from the images, the context and usage of images, user opinions and others. Not all tags are ...
Aixin Sun, Sourav S. Bhowmick
MOBIHOC
2010
ACM
13 years 5 months ago
On quality of monitoring for multi-channel wireless infrastructure networks
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource manage...
Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Ro...