Sciweavers

15416 search results - page 55 / 3084
» Embeddings of Computable Structures
Sort
View
104
Voted
PERCOM
2006
ACM
15 years 20 days ago
Embedding expression: Pervasive computing architecture for art and entertainment
Pervasive computing's historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural act...
Jeff Burke, Jonathan Friedman, Eitan Mendelowitz, ...
DSN
2000
IEEE
15 years 5 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
81
Voted
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
15 years 10 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han
95
Voted
IEICET
2008
147views more  IEICET 2008»
15 years 24 days ago
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wa...