Sciweavers

1010 search results - page 15 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
CCS
2008
ACM
15 years 1 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
GLOBECOM
2009
IEEE
15 years 6 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
SEMWEB
2007
Springer
15 years 5 months ago
On the Foundations of Computing Deltas Between RDF Models
The ability to compute the differences that exist between two RDF models is an important step to cope with the evolving nature of the Semantic Web (SW). In particular, RDF Deltas c...
Dimitris Zeginis, Yannis Tzitzikas, Vassilis Chris...
ISBI
2004
IEEE
16 years 13 days ago
Model Based Symmetric Information Theoretic Large Deformation Multi-Modal Image Registration
This paper presents a Bayesian framework for generating inverse-consistent inter-subject large deformation transformations between two multi-modal image sets of the brain. In this...
Peter Lorenzen, Brad Davis, Sarang C. Joshi
HPCA
2008
IEEE
16 years 2 days ago
Amdahl's Law in the multicore era
We apply Amdahl's Law to multicore chips using symmetric cores, asymmetric cores, and dynamic techniques that allows cores to work together on sequential execution. To Amdahl...
Mark D. Hill