Sciweavers

13180 search results - page 2268 / 2636
» Network Models
Sort
View
AAAI
2011
14 years 4 months ago
Global Seismic Monitoring: A Bayesian Approach
The automated processing of multiple seismic signals to detect and localize seismic events is a central tool in both geophysics and nuclear treaty verification. This paper report...
Nimar S. Arora, Stuart Russell, Paul Kidwell, Erik...
179
Voted
CORR
2008
Springer
146views Education» more  CORR 2008»
15 years 4 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
IACR
2011
124views more  IACR 2011»
14 years 4 months ago
Generic Fully Simulatable Adaptive Oblivious Transfer
We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable security, from various well-known assumptions such as DDH, d-Linear, QR, DCR, and LWE. To t...
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
SC
2009
ACM
15 years 11 months ago
Building the PolarGrid portal using web 2.0 and OpenSocial
Science requires collaboration. In this paper, we investigate the feasibility of coupling current social networking techniques to science gateways to provide a scientific collabor...
Zhenhua Guo, Raminderjeet Singh, Marlon E. Pierce
CG
2006
Springer
15 years 4 months ago
Constrained diffusion-limited aggregation in 3 dimensions
Diffusion Limited Aggregation (DLA) has usually been studied in 2 dimensions as a model of fractal growth processes such as river networks, plant branching, frost on glass, electr...
Paul D. Bourke
« Prev « First page 2268 / 2636 Last » Next »