Sciweavers

2199 search results - page 359 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
94
Voted
COOPIS
2003
IEEE
15 years 6 months ago
Implementation Experience with OMG's SCIOP Mapping
Longevity of distributed computing middleware standards, such as CORBA, depend on their ability to support a range of applications by providing low overhead access in a uniform man...
Gautam H. Thaker, Patrick J. Lardieri, Chuck Winte...
91
Voted
JCC
2010
74views more  JCC 2010»
14 years 11 months ago
A first-order system least-squares finite element method for the Poisson-Boltzmann equation
The Poisson-Boltzmann equation is an important tool in modeling solvent in biomolecular systems. In this paper, we focus on numerical approximations to the electrostatic potential...
Stephen D. Bond, Jehanzeb Hameed Chaudhry, Eric C....
EUROCRYPT
2000
Springer
15 years 4 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
98
Voted
MASCOTS
2001
15 years 2 months ago
Parameterized Mobile Action Generator for a Wireless PCS Network
While there are different research groups in the mobile computing community, most research requires mobile action data in terms of user calling and mobility patterns. Since collec...
Sang-Eon Park, Carla N. Purdy
ISVC
2007
Springer
15 years 6 months ago
Automated Scene-Specific Selection of Feature Detectors for 3D Face Reconstruction
In comparison with 2D face images, 3D face models have the advantage of being illumination and pose invariant, which provides improved capability of handling changing environments ...
Yi Yao, Sreenivas R. Sukumar, Besma R. Abidi, Davi...