Sciweavers

384 search results - page 35 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
PLDI
2005
ACM
15 years 7 months ago
Programming by sketching for bit-streaming programs
This paper introduces the concept of programming with sketches, an approach for the rapid development of high-performance applications. This approach allows a programmer to write ...
Armando Solar-Lezama, Rodric M. Rabbah, Rastislav ...
NSDI
2007
15 years 4 months ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi
CORIA
2008
15 years 3 months ago
KWSim: Concepts Similarity Measure
The comparison of manually annotated medical images can be done using the comparison of keywords in a lexical way or using the existing medical thesauri to calculate semantic simil...
Youssef Matar, Elöd Egyed-Zsigmond, Sonia Laj...
IJCNN
2006
IEEE
15 years 8 months ago
Greedy forward selection algorithms to Sparse Gaussian Process Regression
Abstract— This paper considers the basis vector selection issue invloved in forward selection algorithms to sparse Gaussian Process Regression (GPR). Firstly, we re-examine a pre...
Ping Sun, Xin Yao
WETICE
2008
IEEE
15 years 8 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...