Sciweavers

4276 search results - page 569 / 856
» Computability of Probability Distributions and Distribution ...
Sort
View
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 6 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
CVPR
2003
IEEE
16 years 7 months ago
Nonparametric Belief Propagation
In many applications of graphical models arising in computer vision, the hidden variables of interest are most naturally specified by continuous, non-Gaussian distributions. There...
Erik B. Sudderth, Alexander T. Ihler, William T. F...
JSSPP
2009
Springer
15 years 11 months ago
Scalability Analysis of Job Scheduling Using Virtual Nodes
It is important to identify scalability constraints in existing job scheduling software as they are applied to next generation parallel systems. In this paper, we analyze the scala...
Norman Bobroff, Richard Coppinger, Liana Fong, See...
MIDDLEWARE
2009
Springer
15 years 11 months ago
PAQ: Persistent Adaptive Query Middleware for Dynamic Environments
Abstract. Pervasive computing applications often entail continuous monitoring tasks, issuing persistent queries that return continuously updated views of the operational environmen...
Vasanth Rajamani, Christine Julien, Jamie Payton, ...
IPPS
2008
IEEE
15 years 11 months ago
Mobility control schemes with quick convergence in wireless sensor networks
In the near future, wireless sensor networks (WSN) performing sensing and communication tasks will be widely deployed as technology rapidly advances. Communication is one of the e...
Xiao Chen, Zhen Jiang, Jie Wu