Sciweavers

24188 search results - page 4785 / 4838
» Computing on Encrypted Data
Sort
View
CE
2008
122views more  CE 2008»
14 years 10 months ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang
CN
2008
163views more  CN 2008»
14 years 10 months ago
Loss-resilient window-based congestion control
This paper addresses the problem of fair allocation of bandwidth resources on lossy channels in hybrid heterogeneous networks. It discusses more particularly the ability of window...
Christophe De Vleeschouwer, Pascal Frossard
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 10 months ago
Microlocal Analysis of the Geometric Separation Problem
Image data are often composed of two or more geometrically distinct constituents; in galaxy catalogs, for instance, one sees a mixture of pointlike structures (galaxy supercluster...
David L. Donoho, Gitta Kutyniok
CONCURRENCY
2008
119views more  CONCURRENCY 2008»
14 years 10 months ago
InterGrid: a case for internetworking islands of Grids
: Over the last few years, several nations around the world have set up Grids to share resources such as computers, data, and instruments to enable collaborative science, engineeri...
Marcos Dias de Assunção, Rajkumar Bu...
CORR
2010
Springer
206views Education» more  CORR 2010»
14 years 10 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
« Prev « First page 4785 / 4838 Last » Next »