Sciweavers

4469 search results - page 824 / 894
» Comparing and Combining Profiles
Sort
View
183
Voted
EUROCRYPT
2010
Springer
15 years 8 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
AUTOMOTIVEUI
2009
ACM
15 years 8 months ago
Towards an H-Mode for highly automated vehicles: driving with side sticks
The increasing traffic volume confronts the road user with a challenging task. The high number of traffic deaths might not be reducible with passive safety alone. However systems ...
Martin Kienle, Daniel Damböck, Johann Kelsch,...
SC
2009
ACM
15 years 8 months ago
A framework for core-level modeling and design of reconfigurable computing algorithms
Reconfigurable computing (RC) is rapidly becoming a vital technology for many applications, from high-performance computing to embedded systems. The inherent advantages of custom-...
Gongyu Wang, Greg Stitt, Herman Lam, Alan D. Georg...
164
Voted
SC
2009
ACM
15 years 8 months ago
GPU based sparse grid technique for solving multidimensional options pricing PDEs
It has been shown that the sparse grid combination technique can be a practical tool to solve high dimensional PDEs arising in multidimensional option pricing problems in finance...
Abhijeet Gaikwad, Ioane Muni Toke
186
Voted
GEOS
2009
Springer
15 years 8 months ago
Bottom-Up Gazetteers: Learning from the Implicit Semantics of Geotags
As directories of named places, gazetteers link the names to geographic footprints and place types. Most existing gazetteers are managed strictly top-down: entries can only be adde...
Carsten Keßler, Patrick Maué, Jan Tor...