Sciweavers

5790 search results - page 249 / 1158
» Distributed programming with distributed authorization
Sort
View
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
16 years 3 months ago
Probabilistic author-topic models for information discovery
We propose a new unsupervised learning technique for extracting information from large text collections. We model documents as if they were generated by a two-stage stochastic pro...
Mark Steyvers, Padhraic Smyth, Michal Rosen-Zvi, T...
HPCN
1999
Springer
15 years 7 months ago
WebFlow: A Framework for Web Based Metacomputing
We developed a platform independent, three-tier system, called WebFlow. The visual authoring tools implemented in the front end integrated with the middle tier network of servers ...
Tomasz Haupt, Erol Akarsu, Geoffrey Fox
WSC
2004
15 years 4 months ago
Incremental Planar Motion
A cellular engineer typically estimates system performance via simulation. An important input to this simulation is the average busy hour subscriber location distribution. The per...
Tony Dean
146
Voted
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 9 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
DCOSS
2005
Springer
15 years 8 months ago
Database-Centric Programming for Wide-Area Sensor Systems
A wide-area sensor system is a complex, dynamic, resource-rich cloud of Internet-connected sensing devices. In this paper, we propose X-Tree Programming, a novel database-centric ...
Shimin Chen, Phillip B. Gibbons, Suman Nath