Sciweavers

24529 search results - page 305 / 4906
» Computing on Authenticated Data
Sort
View
ALENEX
2003
139views Algorithms» more  ALENEX 2003»
15 years 5 months ago
Interpolation over Light Fields with Applications in Computer Graphics
We present a data structure, called a ray interpolant tree, or RI-tree, which stores a discrete set of directed lines in 3-space, each represented as a point in 4-space. Each dire...
F. Betul Atalay, David M. Mount
154
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
BIOCOMP
2006
15 years 5 months ago
Computational Inference of Compound-induced Anti-inflammatory Effects Across Time in an Adjuvant-induced Arthritis Rat Model
A number of diseases, such as arthritis and cardiovascular disorders impacting the lives of many people have strong inflammatory components. To elucidate the antiinflammatory mecha...
Jing Yu, Gabriel Helmlinger, Muriel Saulnier, Anna...
139
Voted
CVPR
2005
IEEE
16 years 6 months ago
3D Reconstruction by Fitting Low-Rank Matrices with Missing Data
Daniel Martinec, Tomás Pajdla
81
Voted
CVPR
2007
IEEE
16 years 6 months ago
Reducing correspondence ambiguity in loosely labeled training data
Kobus Barnard, Quanfu Fan