Sciweavers

5227 search results - page 1040 / 1046
» Constructing New Media
Sort
View
INFOCOM
2011
IEEE
14 years 3 months ago
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
—We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). We use combinatorial designs to establish pairwise keys betwee...
Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic
NAR
2011
290views Computer Vision» more  NAR 2011»
14 years 2 months ago
AHD2.0: an update version of Arabidopsis Hormone Database for plant systematic studies
Phytohormone studies enlightened our knowledge of plant responses to various changes. To provide a systematic and comprehensive view of genes participating in plant hormonal regul...
Zhiqiang Jiang, Xiao-Chuan Liu, Zhiyu Peng, Yinan ...
PVLDB
2011
14 years 2 months ago
Merging What's Cracked, Cracking What's Merged: Adaptive Indexing in Main-Memory Column-Stores
Adaptive indexing is characterized by the partial creation and refinement of the index as side effects of query execution. Dynamic or shifting workloads may benefit from prelimi...
Stratos Idreos, Stefan Manegold, Harumi A. Kuno, G...
ASIACRYPT
2011
Springer
13 years 11 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
CIKM
2011
Springer
13 years 11 months ago
Mining entity translations from comparable corpora: a holistic graph mapping approach
This paper addresses the problem of mining named entity translations from comparable corpora, specifically, mining English and Chinese named entity translation. We first observe...
Jinhan Kim, Long Jiang, Seung-won Hwang, Young-In ...
« Prev « First page 1040 / 1046 Last » Next »