Sciweavers

1323 search results - page 93 / 265
» Updatable Security Views
Sort
View
SIAMMAX
2010
134views more  SIAMMAX 2010»
14 years 9 months ago
Dynamical Tensor Approximation
For the approximation of time-dependent data tensors and of solutions to tensor differential equations by tensors of low Tucker rank, we study a computational approach that can be ...
Othmar Koch, Christian Lubich
ICASSP
2011
IEEE
14 years 6 months ago
Multi-sensor PHD: Construction and implementation by space partitioning
The Probability Hypothesis Density (PHD) is a well-known method for single-sensor multi-target tracking problems in a Bayesian framework, but the extension to the multi-sensor cas...
Emmanuel Delande, Emmanuel Duflos, Philippe Vanhee...
123
Voted
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
14 years 2 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
137
Voted
DEXA
1998
Springer
179views Database» more  DEXA 1998»
15 years 6 months ago
Concurrent Warehouse Maintenance Without Compromising Session Consistency
Abstract. To achieve acceptable query response times in data warehouse environments, the data have to be pre-aggregated according to the need of the applications and stored redunda...
Michael Teschke, Achim Ulbrich
ACSAC
2010
IEEE
15 years 13 days ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...