Sciweavers

1783 search results - page 326 / 357
» Provenance and Data Synchronization
Sort
View
IJCAT
2010
87views more  IJCAT 2010»
13 years 7 months ago
Image-based measurement of alveoli volume expansion in an animal model of a diseased lung
Currently, there does not exist reliable MV treatment or protocols in critical care to treat acute respiratory diseases, and thus no proven way to optimise care to minimise the mor...
Christopher E. Hann, Darren Hewett, J. Geoffrey Ch...
ITIIS
2010
137views more  ITIIS 2010»
13 years 7 months ago
Improving the Availability of Scalable on-demand Streams by Dynamic Buffering on P2P Networks
In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable cl...
Chow-Sing Lin
JOC
2010
124views more  JOC 2010»
13 years 7 months ago
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
We present a new encryption scheme which is secure against adaptive chosenciphertext attack (or CCA2-secure) in the standard model (i.e. without the use of random oracle). Our sch...
Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Vict...
CASCON
2010
174views Education» more  CASCON 2010»
13 years 6 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
ICPR
2010
IEEE
13 years 6 months ago
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds
Abstract--Boosting covariance data on Riemannian manifolds has proven to be a convenient strategy in a pedestrian detection context. In this paper we show that the detection perfor...
Diego Tosato, Michela Farenzena, Marco Cristani, V...