Sciweavers

813 search results - page 51 / 163
» Pipeline-centric provenance model
Sort
View
EUROPAR
2009
Springer
14 years 2 months ago
Two-Dimensional Matrix Partitioning for Parallel Computing on Heterogeneous Processors Based on Their Functional Performance Mod
Abstract. The functional performance model (FPM) of heterogeneous processors has proven to be more realistic than the traditional models because it integrates many important featur...
Alexey L. Lastovetsky, Ravi Reddy
ICMCS
2000
IEEE
138views Multimedia» more  ICMCS 2000»
14 years 2 months ago
Event-Coupled Hidden Markov Models
Inferences from time-series data can be greatly enhanced by taking into account multiple modalities. In some cases, such as audio of speech and the corresponding video of lip gest...
Trausti T. Kristjansson, Brendan J. Frey, Thomas S...
EUROCRYPT
2008
Springer
13 years 11 months ago
Towards Key-Dependent Message Security in the Standard Model
Standard security notions for encryption schemes do not guarantee any security if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion of security...
Dennis Hofheinz, Dominique Unruh
CJ
2007
106views more  CJ 2007»
13 years 10 months ago
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analyzed by researchers from the computer s...
Kim-Kwang Raymond Choo
ICWE
2005
Springer
14 years 3 months ago
An Article Language Model for BBS Search
Bulletin Board Systems (BBS), similar to blogs, newsgroups, online forums, etc., are online broadcasting spaces where people can exchange ideas and make announcements. As BBS are b...
Jingfang Xu, Yangbo Zhu, Xing Li