Sciweavers

10414 search results - page 1818 / 2083
» An efficient algorithm for Co-segmentation
Sort
View
BNCOD
2009
145views Database» more  BNCOD 2009»
15 years 5 months ago
A Study of a Positive Fragment of Path Queries: Expressiveness, Normal Form, and Minimization
We study the expressiveness of a positive fragment of path queries, denoted Path+ , on node-labeled trees documents. The expressiveness of Path+ is studied from two angles. First, ...
Yuqing Wu, Dirk Van Gucht, Marc Gyssens, Jan Pared...
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 5 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Oblivious RAM Revisited
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a client, that can store locally only a constant amount of data, to store remotely ...
Benny Pinkas, Tzachy Reinman
DEXA
2010
Springer
180views Database» more  DEXA 2010»
15 years 5 months ago
Identifying Interesting Instances for Probabilistic Skylines
Significant research efforts have recently been dedicated to modeling and querying uncertain data. In this paper, we focus on skyline analysis of uncertain data, modeled as uncert...
Yinian Qi, Mikhail J. Atallah
DMSN
2010
ACM
15 years 5 months ago
PAO: power-efficient attribution of outliers in wireless sensor networks
Sensor nodes constitute inexpensive, disposable devices that are often scattered in harsh environments of interest so as to collect and communicate desired measurements of monitor...
Nikos Giatrakos, Yannis Kotidis, Antonios Deligian...
« Prev « First page 1818 / 2083 Last » Next »