Sciweavers

24529 search results - page 148 / 4906
» Computing on Authenticated Data
Sort
View
TDSC
2011
14 years 10 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
PODC
2011
ACM
14 years 5 months ago
The complexity of robust atomic storage
We study the time-complexity of robust atomic read/write storage from fault-prone storage components in asynchronous message-passing systems. Robustness here means wait-free tolera...
Dan Dobre, Rachid Guerraoui, Matthias Majuntke, Ne...
VISUALIZATION
1998
IEEE
15 years 7 months ago
Data level comparison of wind tunnel and computational fluid dynamics data
This paper describes the architecture of a data level comparative visualization system and experiences using it to study computational fluid dynamics data and experimental wind tu...
Qin Shen, Alex Pang, Samuel P. Uselton
IPPS
1998
IEEE
15 years 7 months ago
High Performance Data Mining Using Data Cubes on Parallel Computers
On-Line Analytical Processing techniques are used for data analysis and decision support systems. The multidimensionality of the underlying data is well represented by multidimens...
Sanjay Goil, Alok N. Choudhary
ICIP
2002
IEEE
16 years 4 months ago
Fusion of X ray radiographic data and anatomical data in computed tomography
In this paper, we consider an X ray computed tomography (CT) image reconstruction problem using two different kinds of data: classical X-rays radiographic data and some geometrica...
Ali Mohammad-Djafari