Sciweavers

3571 search results - page 711 / 715
» On the Power of Imperfect Information
Sort
View
NAR
2011
290views Computer Vision» more  NAR 2011»
14 years 2 months ago
AHD2.0: an update version of Arabidopsis Hormone Database for plant systematic studies
Phytohormone studies enlightened our knowledge of plant responses to various changes. To provide a systematic and comprehensive view of genes participating in plant hormonal regul...
Zhiqiang Jiang, Xiao-Chuan Liu, Zhiyu Peng, Yinan ...
PLDI
2011
ACM
14 years 2 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
JSAC
2007
116views more  JSAC 2007»
14 years 11 months ago
GroCoca: group-based peer-to-peer cooperative caching in mobile environment
— In a mobile cooperative caching environment, we observe the need for cooperating peers to cache useful data items together, so as to improve cache hit from peers. This could be...
Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
ICDCS
2011
IEEE
13 years 11 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...