Sciweavers

24188 search results - page 198 / 4838
» Computing on Encrypted Data
Sort
View
DSN
2011
IEEE
14 years 3 months ago
Analysis of security data from a large computing organization
In this work, we study security incidents that occurred over period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The analysis co...
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow,...
ICDAR
2009
IEEE
15 years 10 months ago
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations
The forensic investigation of a questioned signature written on a piece of paper is a challenging task. Electronic pen-tablets for recording writing movements are considered valua...
Katrin Franke
105
Voted
WADS
1995
Springer
82views Algorithms» more  WADS 1995»
15 years 6 months ago
On the Computation of Fast Data Transmissions in Networks with Capacities and Delays
We examine the problem of transmitting in minimum time a given amount of data between a source and a destination in a network with finite channel capacities and non–zero propaga...
Dimitrios Kagaris, Spyros Tragoudas, Grammati E. P...
CCCG
2003
15 years 4 months ago
Computing Delaunay Triangulation with Imprecise Input Data
The key step in the construction of the Delaunay triangulation of a finite set of planar points is to establish correctly whether a given point of this set is inside or outside t...
Ali Asghar Khanban, Abbas Edalat
W2GIS
2004
Springer
15 years 8 months ago
A Progressive Reprocessing Transaction Model for Updating Spatial Data in Mobile Computing Environments
Mobile transactions for updating spatial data are long-lived transactions that update local copies of the mobile platforms on disconnection. Since a mobile transaction is physicall...
Donghyun Kim, Bonghee Hong