Sciweavers

2395 search results - page 451 / 479
» A comparative study of two object recognition methods
Sort
View
P2P
2007
IEEE
15 years 3 months ago
A Data Placement Scheme with Time-Related Model for P2P Storages
Maintaining desired data availability while minimizing costs is the primary challenge in designing P2P storages. Data placement schemes and data availability calculation methods a...
Jing Tian, Zhi Yang, Yafei Dai
119
Voted
EDBT
2008
ACM
180views Database» more  EDBT 2008»
15 years 9 months ago
Probabilistic ranked queries in uncertain databases
Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to "certain" data, ...
Xiang Lian, Lei Chen 0002
TMC
2012
13 years 1 days ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
78
Voted
BMCBI
2010
112views more  BMCBI 2010»
14 years 9 months ago
Orientation-dependent backbone-only residue pair scoring functions for fixed backbone protein design
Background: Empirical scoring functions have proven useful in protein structure modeling. Most such scoring functions depend on protein side chain conformations. However, backbone...
Andrew J. Bordner