Sciweavers

537 search results - page 105 / 108
» The Saga Security System: A Security Architecture for Open D...
Sort
View
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 26 days ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
ATAL
2008
Springer
13 years 10 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
CORR
2010
Springer
119views Education» more  CORR 2010»
13 years 8 months ago
Report on the XBase Project
This project addressed the conceptual fundamentals of data storage, investigating techniques for provision of highly generic storage facilities that can be tailored to produce var...
Evangelos Zirintsis, Graham N. C. Kirby, Alan Dear...
BIOINFORMATICS
2007
102views more  BIOINFORMATICS 2007»
13 years 9 months ago
OmicBrowse: a browser of multidimensional omics annotations
OmicBrowse is a browser to explore multiple datasets coordinated in the multidimensional omic space integrating omics knowledge ranging from genomes to phenomes and connecting evo...
Tetsuro Toyoda, Yoshiki Mochizuki, Keith Player, N...
IPPS
2009
IEEE
14 years 3 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...