Sciweavers

3179 search results - page 224 / 636
» Applications of PCF Theory
Sort
View
111
Voted
PAMI
2012
13 years 3 months ago
M-Idempotent and Self-Dual Morphological Filters
—In this paper, we present a comprehensive analysis of self-dual and m-idempotent operators. We refer to an operator as m-idempotent if it converges after m iterations. We focus ...
Nidhal Bouaynaya, Mohammed Charif-Chefchaouni, Dan...
EUROCRYPT
2012
Springer
13 years 3 months ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
147
Voted
EDBT
2012
ACM
308views Database» more  EDBT 2012»
13 years 3 months ago
Transactional stream processing
Many stream processing applications require access to a multitude of streaming as well as stored data sources. Yet there is no clear semantics for correct continuous query executi...
Irina Botan, Peter M. Fischer, Donald Kossmann, Ne...
96
Voted
IPPS
2005
IEEE
15 years 6 months ago
Practical Divisible Load Scheduling on Grid Platforms with APST-DV
Divisible load applications consist of a load, that is input data and associated computation, that can be divided arbitrarily into independent pieces. Such applications arise in m...
Krijn van der Raadt, Yang Yang, Henri Casanova
83
Voted
ICMI
2005
Springer
107views Biometrics» more  ICMI 2005»
15 years 6 months ago
Exploring multimodality in the laboratory and the field
There are new challenges to us, as researchers, on how to design and evaluate new mobile applications because they give users access to powerful computing devices through small in...
Lynne Baillie, Raimund Schatz