Sciweavers

13985 search results - page 2540 / 2797
» Active Feature Models
Sort
View
ADHOCNOW
2007
Springer
15 years 10 months ago
Information Brokerage Via Location-Free Double Rulings
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Stefan Funke, Imran Rauf
ASIACRYPT
2007
Springer
15 years 10 months ago
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
ersion of an extended abstract to be published in Advances in Cryptology—ASIACRYPT 2007, Springer-Verlag, 2007. Available online from: http://www.cs.stanford.edu/∼xb/asiacrypt0...
Xavier Boyen
BVAI
2007
Springer
15 years 10 months ago
Neural Object Recognition by Hierarchical Learning and Extraction of Essential Shapes
We present a hierarchical system for object recognition that models neural mechanisms of visual processing identified in the mammalian ventral stream. The system is composed of ne...
Daniel Oberhoff, Marina Kolesnik
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
15 years 10 months ago
A Practical and Tightly Secure Signature Scheme Without Hash Function
In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA problem) were independently introduced: the Gennaro-Halevi-Rabin (GHR) signature scheme and the...
Benoît Chevallier-Mames, Marc Joye
DAMON
2007
Springer
15 years 10 months ago
Vectorized data processing on the cell broadband engine
In this work, we research the suitability of the Cell Broadband Engine for database processing. We start by outlining the main architectural features of Cell and use microbenchmar...
Sándor Héman, Niels Nes, Marcin Zuko...
« Prev « First page 2540 / 2797 Last » Next »