Sciweavers

5829 search results - page 1063 / 1166
» The Practice of Cluster Analysis
Sort
View
ICISC
2009
169views Cryptology» more  ICISC 2009»
13 years 7 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
CVPR
2011
IEEE
13 years 5 months ago
Accelerated Low-Rank Visual Recovery by Random Projection
Exact recovery from contaminated visual data plays an important role in various tasks. By assuming the observed data matrix as the addition of a low-rank matrix and a sparse matri...
Yadong Mu, Jian Dong, Xiaotong Yuan, Shuicheng Yan
JSCIC
2011
65views more  JSCIC 2011»
13 years 5 months ago
A New Class of High-Order Energy Stable Flux Reconstruction Schemes
Abstract The flux reconstruction approach to high-order methods is robust, efficient, simple to implement, and allows various high-order schemes, such as the nodal discontinuous ...
Peter E. Vincent, Patrice Castonguay, Antony James...
PPNA
2011
13 years 5 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
PROMISE
2010
13 years 4 months ago
Prediction of defect distribution based on project characteristics for proactive project management
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...
Youngki Hong, Wondae Kim, Jeongsoo Joo
« Prev « First page 1063 / 1166 Last » Next »