Sciweavers

10670 search results - page 2130 / 2134
» Required Information Release
Sort
View
CRYPTO
2012
Springer
268views Cryptology» more  CRYPTO 2012»
12 years 7 days ago
Secret Sharing Schemes for Very Dense Graphs
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any informatio...
Amos Beimel, Oriol Farràs, Yuval Mintz
PAMI
2012
12 years 7 days ago
IntentSearch: Capturing User Intention for One-Click Internet Image Search
—Web-scale image search engines (e.g. Google Image Search, Bing Image Search) mostly rely on surrounding text features. It is difficult for them to interpret users’ search int...
Xiaoou Tang, Ke Liu, Jingyu Cui, Fang Wen, Xiaogan...
JAIR
2012
254views Hardware» more  JAIR 2012»
12 years 7 days ago
Completeness Guarantees for Incomplete Ontology Reasoners: Theory and Practice
To achieve scalability of query answering, the developers of Semantic Web applications are often forced to use incomplete OWL 2 reasoners, which fail to derive all answers for at ...
Bernardo Cuenca Grau, Boris Motik, Giorgos Stoilos...
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
12 years 6 days ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
TVCG
2012
195views Hardware» more  TVCG 2012»
12 years 6 days ago
Hierarchical Streamline Bundles
—Effective three-dimensional streamline placement and visualization plays an essential role in many science and engineering disciplines. The main challenge for effective streamli...
Hongfeng Yu, Chaoli Wang, Ching-Kuang Shene, Jacqu...
« Prev « First page 2130 / 2134 Last » Next »