Sciweavers

9186 search results - page 1467 / 1838
» A Module System for Scheme
Sort
View
171
Voted
CCS
2010
ACM
15 years 3 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
AES
2007
Springer
75views Cryptology» more  AES 2007»
15 years 3 months ago
Improved FVM for two-layer shallow-water models: Application to the Strait of Gibraltar
This paper deals with the numerical simulation of flows of stratified fluids through channels with irregular geometry. Channel crosssections are supposed to be symmetric but no...
Manuel Jose Castro Díaz, José A. Gar...
142
Voted
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 3 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
164
Voted
PAA
2006
15 years 3 months ago
Audio-visual sports highlights extraction using Coupled Hidden Markov Models
We present our studies on the application of Coupled Hidden Markov Models(CHMMs) to sports highlights extraction from broadcast video using both audio and video information. First,...
Ziyou Xiong
135
Voted
SIAMSC
2008
140views more  SIAMSC 2008»
15 years 3 months ago
Newton-GMRES Preconditioning for Discontinuous Galerkin Discretizations of the Navier--Stokes Equations
We study preconditioners for the iterative solution of the linear systems arising in the implicit time integration of the compressible Navier-Stokes equations. The spatial discreti...
Per-Olof Persson, Jaime Peraire
« Prev « First page 1467 / 1838 Last » Next »