Sciweavers

675 search results - page 80 / 135
» What Is New in Our City
Sort
View
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 4 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
MONET
2002
155views more  MONET 2002»
13 years 10 months ago
A Prioritized Real-Time Wireless Call Degradation Framework for Optimal Call Mix Selection
This paper describes a framework for selecting the optimal call mix to be admitted while employing a bandwidth degradation policy in a wireless cellular network. The optimal proper...
Gergely V. Záruba, Imrich Chlamtac, Sajal K...
SIGMOD
2011
ACM
210views Database» more  SIGMOD 2011»
13 years 1 months ago
A platform for scalable one-pass analytics using MapReduce
Today’s one-pass analytics applications tend to be data-intensive in nature and require the ability to process high volumes of data efficiently. MapReduce is a popular programm...
Boduo Li, Edward Mazur, Yanlei Diao, Andrew McGreg...
SIGMOD
2009
ACM
190views Database» more  SIGMOD 2009»
14 years 11 months ago
DataLens: making a good first impression
When a database query has a large number of results, the user can only be shown one page of results at a time. One popular approach is to rank results such that the "best&quo...
Bin Liu, H. V. Jagadish
SAC
2003
ACM
14 years 4 months ago
iGrocer- A Ubiquitous and Pervasive Smart Grocery Shopping System
Emerging Smart phones are poised to give a whole new dimension to the way we shop, bank, and go about many of our everyday activities. iGrocer is a smart grocery shopping assistant...
Sangeetha Shekar, Prashant Nair, Abdelsalam Helal