Sciweavers

24529 search results - page 420 / 4906
» Computing on Authenticated Data
Sort
View
120
Voted
CBMS
2005
IEEE
15 years 10 months ago
Challenges of Ultra Large Scale Integration of Biomedical Computing Systems
The NCRI Informatics Initiative is overseeing the implementation of an informatics framework for the UK cancer research community. The framework advocates an integrated multidisci...
R. H. J. Begent, J. Michael Brady, Anthony Finkels...
EUC
2004
Springer
15 years 10 months ago
Location-Aware Information Retrieval for Mobile Computing
Abstract. With the knowledge about their locations, mobile users are able to issue location-dependent queries. Most of existing approaches focus on how to obtain the information ab...
Jiannong Cao, Kwok Ming Chan, Geoffrey Yu-Kai Shea...
PSD
2004
Springer
132views Database» more  PSD 2004»
15 years 10 months ago
Computational Experiments with Minimum-Distance Controlled Perturbation Methods
Minimum-distance controlled perturbation is a recent family of methods for the protection of statistical tabular data. These methods are both efficient and versatile, since can dea...
Jordi Castro
ICDM
2003
IEEE
135views Data Mining» more  ICDM 2003»
15 years 10 months ago
An Algorithm for the Exact Computation of the Centroid of Higher Dimensional Polyhedra and its Application to Kernel Machines
The Support Vector Machine (SVM) solution corresponds to the centre of the largest sphere inscribed in version space. Alternative approaches like Bayesian Point Machines (BPM) and...
Frédéric Maire
CHES
2003
Springer
145views Cryptology» more  CHES 2003»
15 years 10 months ago
Cryptanalysis of DES Implemented on Computers with Cache
This paper presents the results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay...
Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Mak...