Sciweavers

13553 search results - page 2476 / 2711
» A Generalized Multi-View Approach
Sort
View
CLEF
2007
Springer
15 years 10 months ago
Amharic-English Information Retrieval with Pseudo Relevance Feedback
We describe cross language retrieval experiments using Amharic queries and English language document collection from our participation in the bilingual ad hoc track at the CLEF 20...
Atelach Alemu Argaw
COREGRID
2007
Springer
15 years 10 months ago
Total Exchange Performance Prediction on Grid Environments
One of the most important collective communication patterns used in scientific applications is the complete exchange, also called All-to-All. Although efficient algorithms have b...
Luiz Angelo Steffenel, Emmanuel Jeannot
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
DRM
2007
Springer
15 years 10 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
EMSOFT
2007
Springer
15 years 10 months ago
Loosely time-triggered architectures based on communication-by-sampling
We address the problem of mapping a set of processes which communicate synchronously on a distributed platform. The Time Triggered Architecture (TTA) proposed by Kopetz for the co...
Albert Benveniste, Paul Caspi, Marco Di Natale, Cl...
« Prev « First page 2476 / 2711 Last » Next »