Sciweavers

3571 search results - page 633 / 715
» On the Power of Imperfect Information
Sort
View
PPDP
2010
Springer
13 years 7 months ago
Graph queries through datalog optimizations
This paperdescribes the use of a powerful graph query language for querying programs, and a novel combination of transformations for generating efficient implementations of the q...
K. Tuncay Tekle, Michael Gorbovitski, Yanhong A. L...
TVCG
2010
151views more  TVCG 2010»
13 years 7 months ago
Uncertainty-Aware Guided Volume Segmentation
—Although direct volume rendering is established as a powerful tool for the visualization of volumetric data, efficient and reliable feature detection is still an open topic. Us...
Jörg-Stefan Praßni, Timo Ropinski, Klau...
VTC
2010
IEEE
136views Communications» more  VTC 2010»
13 years 7 months ago
HARQ Aided Systematic LT Coding for Amplify-Forward and Decode-Forward Cooperation
—Systematic Luby Transform (SLT) codes constitute rateless codes, which are capable of adaptively adjusting their code rate depending on the channel quality without explicit chan...
Hoang Anh Ngo, Thanh Dang Nguyen, Lajos Hanzo
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 6 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 6 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...