Sciweavers

562 search results - page 41 / 113
» Dependency Pairs Revisited
Sort
View
CCS
2007
ACM
15 years 8 months ago
Security under key-dependent inputs
In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by B...
Shai Halevi, Hugo Krawczyk
ISPA
2007
Springer
15 years 8 months ago
A Performance Comparison of the Contiguous Allocation Strategies in 3D Mesh Connected Multicomputers
The performance of contiguous allocation strategies can be significantly affected by the distribution of job execution times. In this paper, the performance of the existing contigu...
Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ab...
119
Voted
DCOSS
2006
Springer
15 years 5 months ago
An Optimal Data Propagation Algorithm for Maximizing the Lifespan of Sensor Networks
We consider the problem of data propagation in wireless sensor networks and revisit the family of mixed strategy routing schemes. We show that maximizing the lifespan, balancing th...
Aubin Jarry, Pierre Leone, Olivier Powell, Jos&eac...
APBC
2004
116views Bioinformatics» more  APBC 2004»
15 years 3 months ago
Evolving Genetic Regulatory Networks Using an Artificial Genome
Boolean models of genetic regulatory networks (GRNs) have been shown to exhibit many of the characteristic dynamics of real GRNs, with gene expression patterns settling to point a...
Jennifer Hallinan, Janet Wiles
NIPS
2004
15 years 3 months ago
Common-Frame Model for Object Recognition
A generative probabilistic model for objects in images is presented. An object consists of a constellation of features. Feature appearance and pose are modeled probabilistically. ...
Pierre Moreels, Pietro Perona