Sciweavers

679 search results - page 61 / 136
» hybrid 2010
Sort
View
JOC
2010
124views more  JOC 2010»
13 years 8 months ago
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
We present a new encryption scheme which is secure against adaptive chosenciphertext attack (or CCA2-secure) in the standard model (i.e. without the use of random oracle). Our sch...
Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Vict...
BMCBI
2010
101views more  BMCBI 2010»
13 years 10 months ago
Detection of copy number variation from array intensity and sequencing read depth using a stepwise Bayesian model
Background: Copy number variants (CNVs) have been demonstrated to occur at a high frequency and are now widely believed to make a significant contribution to the phenotypic variat...
Zhengdong D. Zhang, Mark B. Gerstein
JSAC
2010
122views more  JSAC 2010»
13 years 8 months ago
A hybrid reservation/contention-based MAC for video streaming over wireless networks
—To reserve or not for bursty video traffic over wireless access networks has been a long-debated issue. For uplink transmissions in infrastructure-based wireless networks and p...
Ruonan Zhang, Rukhsana Ruby, Jianping Pan, Lin Cai...
ISLPED
2010
ACM
351views Hardware» more  ISLPED 2010»
13 years 10 months ago
Hybrid electrical energy storage systems
Electrical energy is a high quality form of energy that can be easily converted to other forms of energy with high efficiency and, even more importantly, it can be used to control...
Massoud Pedram, Naehyuck Chang, Younghyun Kim, Yan...
CCGRID
2010
IEEE
13 years 11 months ago
An MPI-Stream Hybrid Programming Model for Computational Clusters
The MPI programming model hides network type and topology from developers, but also allows them to seamlessly distribute a computational job across multiple cores in both an intra ...
Emilio Pasquale Mancini, Gregory Marsh, Dhabaleswa...