Sciweavers

ITCC
2005
IEEE
14 years 2 months ago
A Scalable Generative Topographic Mapping for Sparse Data Sequences
We propose a novel, computationally efficient generative topographic model for inferring low dimensional representations of high dimensional data sets, designed to exploit data s...
Ata Kabán
ITCC
2005
IEEE
14 years 2 months ago
An Energy-Efficient Middleware for Supporting Multimedia Services in Mobile Grid Environments
In this paper, we present techniques for exploiting intermittently available resources in grid infrastructures to support QoS-based multimedia applications on mobile devices. Spec...
Yun Huang, Shivajit Mohapatra, Nalini Venkatasubra...
ITCC
2005
IEEE
14 years 2 months ago
An Autonomous Pricing Strategy toward Market Economy in Computational Grids
One of the key steps in economy based grid resource allocation is to make reasonable prices for the grid resources. For resources’ prices decide the resource flow in the Grid, f...
Yang Jin, Shoubao Yang, Maosheng Li, Qianfei Fu
ITCC
2005
IEEE
14 years 2 months ago
A Web Recommendation System Based on Maximum Entropy
We propose a Web recommendation system based on a maximum entropy model. Under the maximum entropy principle, we can combine multiple levels of knowledge about users’ navigation...
Xin Jin, Bamshad Mobasher, Yanzan Zhou
ITCC
2005
IEEE
14 years 2 months ago
Computing Molecular Potential Energy Surface with DIET
New developments in the field of theoretical chemistry require the computation of numerous Molecular Potential Energy Surfaces (PESs) to generate adequate quantum force field pa...
Emmanuel Jeannot, Gerald Monard
ITCC
2005
IEEE
14 years 2 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
ITCC
2005
IEEE
14 years 2 months ago
Using Formal Concept Analysis to Establish Model Dependencies
models evolve at different levels of abstraction, from the requirements specification to development of the source code. The models underlying this process are related and their ...
Igor Ivkovic, Kostas Kontogiannis
ITCC
2005
IEEE
14 years 2 months ago
A New Electronic Cash Model
- With the development of e-commerce, choosing a proper electronic payment method has become more and more important. Competing with other payment methods on the Internet, electron...
Xiaosong Hou, Chik How Tan
ITCC
2005
IEEE
14 years 2 months ago
A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks
This paper presents a high performance and scalable elliptic curve processor which is designed to be resistant against timing attacks. The point multiplication algorithm (double-a...
Alireza Hodjat, David Hwang, Ingrid Verbauwhede
ITCC
2005
IEEE
14 years 2 months ago
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
The popularity of distributed file systems continues to grow. Reasons they are preferred over traditional centralized file systems include fault tolerance, availability, scalabili...
Ragib Hasan, Zahid Anwar, William Yurcik, Larry Br...