Sciweavers

2836 search results - page 565 / 568
» Towards Hovering Information
Sort
View
ICDCS
2010
IEEE
13 years 3 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
CCS
2010
ACM
13 years 2 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
ASC
2011
13 years 1 months ago
Autonomic fault-handling and refurbishment using throughput-driven assessment
A new paradigm for online EH regeneration using Genetic Algorithms (GAs) called Competitive Runtime Reconfiguration (CRR) is developed where performance is assessed based upon a b...
Ronald F. DeMara, Kening Zhang, Carthik A. Sharma
JIPS
2010
159views more  JIPS 2010»
13 years 29 days ago
A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Software evolution is an ongoing process carried out with the aim of extending base applications either for adding new functionalities or for adapting software to changing environm...
Chetna Gupta, Yogesh Singh, Durg Singh Chauhan
BMCBI
2011
13 years 20 days ago
SNPPicker: High quality tag SNP selection across multiple populations
Background: Linkage Disequilibrium (LD) bin-tagging algorithms identify a reduced set of tag SNPs that can capture the genetic variation in a population without genotyping every s...
Hugues Sicotte, David N. Rider, Gregory A. Poland,...