Sciweavers

2097 search results - page 278 / 420
» Distributed user modelling for universal information access
Sort
View
IPPS
2008
IEEE
15 years 11 months ago
Providing security to the Desktop Data Grid
Volunteer Computing is becoming a new paradigm not only for the Computational Grid, but also for institutions using production-level Data Grids because of the enormous storage pot...
Jesus Luna, Michail Flouris, Manolis Marazakis, An...
156
Voted
CORR
2007
Springer
105views Education» more  CORR 2007»
15 years 5 months ago
The source coding game with a cheating switcher
Motivated by the lossy compression of an active-vision video stream, we consider the problem of finding the rate-distortion function of an arbitrarily varying source (AVS) compos...
Hari Palaiyanur, Cheng Chang, Anant Sahai
BMCBI
2006
118views more  BMCBI 2006»
15 years 5 months ago
Djinn Lite: a tool for customised gene transcript modelling, annotation-data enrichment and exploration
Background: There is an ever increasing rate of data made available on genetic variation, transcriptomes and proteomes. Similarly, a growing variety of bioinformatic programs are ...
Erdahl T. Teber, Edward Crawford, Kent B. Bolton, ...
SIGUCCS
2003
ACM
15 years 10 months ago
Teamwork is the heart of technology
IAT Services, the central Information Technology group at the University of Missouri-Columbia, operates computing sites in general access, classroom, and residence hall settings. ...
Tammy Hohlt, Kristina A. Cunningham
171
Voted
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
16 years 5 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao