Sciweavers

373 search results - page 40 / 75
» Two Attacks on Reduced IDEA
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
A complete ensemble empirical mode decomposition with adaptive noise
In this paper an algorithm based on the ensemble empirical mode decomposition (EEMD) is presented. The key idea on the EEMD relies on averaging the modes obtained by EMD applied t...
María Eugenia Torres, Marcelo A. Colominas,...
RECOMB
2006
Springer
14 years 8 months ago
A New Approach to Protein Identification
Advances in tandem mass-spectrometry (MS/MS) steadily increase the rate of generation of MS/MS spectra and make it more computationally challenging to analyze such huge datasets. A...
Nuno Bandeira, Dekel Tsur, Ari Frank, Pavel A. Pev...
CCS
2011
ACM
12 years 7 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ICDE
2009
IEEE
149views Database» more  ICDE 2009»
14 years 9 months ago
OPAQUE: Protecting Path Privacy in Directions Search
Directions search returns the shortest path from a source to a destination on a road network. However, the search interests of users may be exposed to the service providers, thus r...
Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baih...
MICRO
2000
IEEE
96views Hardware» more  MICRO 2000»
14 years 2 days ago
Instruction distribution heuristics for quad-cluster, dynamically-scheduled, superscalar processors
We investigate instruction distribution methods for quadcluster, dynamically-scheduled superscalar processors. We study a variety of methods with different cost, performance and c...
Amirali Baniasadi, Andreas Moshovos