Sciweavers

2199 search results - page 417 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
HPDC
2010
IEEE
15 years 1 months ago
Data parallelism in bioinformatics workflows using Hydra
Large scale bioinformatics experiments are usually composed by a set of data flows generated by a chain of activities (programs or services) that may be modeled as scientific work...
Fábio Coutinho, Eduardo S. Ogasawara, Danie...
108
Voted
CSREASAM
2006
15 years 1 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
85
Voted
JMLR
2010
105views more  JMLR 2010»
14 years 7 months ago
Collective Inference for Extraction MRFs Coupled with Symmetric Clique Potentials
Many structured information extraction tasks employ collective graphical models that capture interinstance associativity by coupling them with various clique potentials. We propos...
Rahul Gupta, Sunita Sarawagi, Ajit A. Diwan
103
Voted
VRIPHYS
2010
14 years 7 months ago
Optimization-based Fluid Simulation on Unstructured Meshes
We present a novel approach to fluid simulation, allowing us to take into account the surface energy in a precise manner. This new approach combines a novel, topology-adaptive app...
Marek Krzysztof Misztal, Robert Bridson, Kenny Erl...
CGF
2004
194views more  CGF 2004»
15 years 10 days ago
Distributed and Collaborative Visualization
Visualization is a powerful tool for analysing data and presenting results in science, engineering and medicine. This paper reviews ways in which it can be used in distributed and...
Ken Brodlie, David A. Duce, Julian R. Gallop, J. P...