Sciweavers

11016 search results - page 2035 / 2204
» Cloud Computing for Science
Sort
View
CHI
2010
ACM
15 years 8 months ago
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices ...
Tamara Denning, Alan Borning, Batya Friedman, Bria...
ATAL
2008
Springer
15 years 7 months ago
GS3 and Tartanian: game theory-based heads-up limit and no-limit Texas Hold'em poker-playing programs
We demonstrate two game theory-based programs for headsup limit and no-limit Texas Hold'em poker. The first player, GS3, is designed for playing limit Texas Hold'em, in ...
Andrew Gilpin, Tuomas Sandholm, Troels Bjerre S&os...
150
Voted
DEBS
2008
ACM
15 years 6 months ago
Top-k/w publish/subscribe: finding k most relevant publications in sliding time window w
Existing content-based publish/subscribe systems are designed assuming that all matching publications are equally relevant to a subscription. As we cannot know in advance the dist...
Kresimir Pripuzic, Ivana Podnar Zarko, Karl Aberer
EUROCRYPT
2008
Springer
15 years 6 months ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup
EUROISI
2008
15 years 6 months ago
Homeland Security Data Mining Using Social Network Analysis
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon ...
Hsinchun Chen
« Prev « First page 2035 / 2204 Last » Next »