Sciweavers

7623 search results - page 1459 / 1525
» Constructive Volume Modeling
Sort
View
UC
2009
Springer
15 years 7 months ago
Abstract Geometrical Computation and Computable Analysis
Geometrical Computation and Computable Analysis J´erˆome Durand-Lose⋆ Laboratoire d’Informatique Fondamentale d’Orl´eans, Universit´e d’Orl´eans, B.P. 6759, F-45067 OR...
Jérôme Durand-Lose
102
Voted
ACSC
2008
IEEE
15 years 7 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen
85
Voted
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
15 years 7 months ago
Convergence of rule-of-thumb learning rules in social networks
— We study the problem of dynamic learning by a social network of agents. Each agent receives a signal about an underlying state and communicates with a subset of agents (his nei...
Daron Acemoglu, Angelia Nedic, Asuman E. Ozdaglar
ICASSP
2008
IEEE
15 years 7 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
106
Voted
ITNG
2008
IEEE
15 years 7 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
« Prev « First page 1459 / 1525 Last » Next »