Sciweavers

729 search results - page 121 / 146
» Computing persistent homology
Sort
View
VLDB
2007
ACM
89views Database» more  VLDB 2007»
15 years 3 months ago
GhostDB: Hiding Data from Prying Eyes
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Christophe Salperwyck, Nicolas Anciaux, Mehdi Benz...
WIOPT
2006
IEEE
15 years 3 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
72
Voted
COLCOM
2005
IEEE
15 years 3 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
COLCOM
2005
IEEE
15 years 3 months ago
Developing a framework for integrating prior problem solving and knowledge sharing histories of a group to predict future group
Using a combination of machine learning probabilistic tools, we have shown that some chemistry students fail to develop productive problem solving strategies through practice alon...
Ron Stevens, Amy Soller, Alessandra Giordani, Luca...
ESCIENCE
2005
IEEE
15 years 3 months ago
Experiences with GRIA - Industrial Applications on a Web Services Grid
The GRIA project set out to make the Grid usable by industry. The GRIA middleware is based on Web Services, and designed to meet the needs of industry for security and business-to...
Mike Surridge, Steve Taylor, David De Roure, Ed Za...