Sciweavers

431 search results - page 53 / 87
» We have always been transgenic
Sort
View
EUROCRYPT
2003
Springer
14 years 2 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
ACPC
1999
Springer
14 years 1 months ago
Optimizing I/O for Irregular Applications on Distributed-Memory Machines
In this paper we present the design, implementation and evaluation of a runtime system based on collective I/O techniques for irregular applications. Its main goal is to provide pa...
Jesús Carretero, Jaechun No, Alok N. Choudh...
DCOSS
2010
Springer
14 years 4 days ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
SGP
2007
13 years 11 months ago
Generalized surface flows for mesh processing
Geometric flows are ubiquitous in mesh processing. Curve and surface evolutions based on functional minimization have been used in the context of surface diffusion, denoising, sha...
Ilya Eckstein, Jean-Philippe Pons, Yiying Tong, C....
CIKM
2008
Springer
13 years 10 months ago
PROQID: partial restarts of queries in distributed databases
In a number of application areas, distributed database systems can be used to provide persistent storage of data while providing efficient access for both local and remote data. W...
Jon Olav Hauglid, Kjetil Nørvåg