Sciweavers

3628 search results - page 611 / 726
» Approaching the Physical Limits of Computing
Sort
View
ESORICS
2009
Springer
15 years 1 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
NIPS
2008
14 years 11 months ago
Covariance Estimation for High Dimensional Data Vectors Using the Sparse Matrix Transform
Covariance estimation for high dimensional vectors is a classically difficult problem in statistical analysis and machine learning. In this paper, we propose a maximum likelihood ...
Guangzhi Cao, Charles A. Bouman
PDPTA
2007
14 years 11 months ago
Multiple Networks for Heterogeneous Distributed Applications
Abstract - We have experienced in our distributed applications that the network is the main limiting factor for performances on clusters. Indeed clusters are cheap and it is easier...
Sylvain Jubertie, Emmanuel Melin
SWAP
2008
14 years 11 months ago
Improving Retrieval Experience Exploiting Semantic Representation of Documents
The traditional strategy performed by Information Retrieval (IR) systems is ranked keyword search: for a given query, a list of documents, ordered by relevance, is returned. Releva...
Pierpaolo Basile, Annalina Caputo, Anna Lisa Genti...
CORR
2010
Springer
82views Education» more  CORR 2010»
14 years 10 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta