Sciweavers

439 search results - page 84 / 88
» Unnesting Arbitrary Queries
Sort
View
MIR
2006
ACM
120views Multimedia» more  MIR 2006»
14 years 3 months ago
Scalable search-based image annotation of personal images
With the prevalence of digital cameras, more and more people have considerable digital images on their personal devices. As a result, there are increasing needs to effectively sea...
Changhu Wang, Feng Jing, Lei Zhang, HongJiang Zhan...
WS
2005
ACM
14 years 3 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
MDM
2005
Springer
165views Communications» more  MDM 2005»
14 years 3 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
RECOMB
2010
Springer
14 years 2 months ago
SubMAP: Aligning Metabolic Pathways with Subnetwork Mappings
Abstract. We consider the problem of aligning two metabolic pathways. Unlike traditional approaches, we do not restrict the alignment to one-to-one mappings between the molecules o...
Ferhat Ay, Tamer Kahveci
TRUST
2010
Springer
14 years 2 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...