Sciweavers

406 search results - page 26 / 82
» PASSing the provenance challenge
Sort
View
WINE
2010
Springer
124views Economy» more  WINE 2010»
14 years 7 months ago
A Novel Approach to Propagating Distrust
Trust propagation is a fundamental topic of study in the theory and practice of ranking and recommendation systems on networks. The Page Rank [9] algorithm ranks web pages by propa...
Christian Borgs, Jennifer T. Chayes, Adam Tauman K...
ICIG
2009
IEEE
14 years 7 months ago
Illumination Invariant Object Tracking with Incremental Subspace Learning
In this paper, we present an efficient and robust subspace learning based object tracking algorithm with special illumination handling. Illumination variances pose a great challen...
Gang Yu, Hongtao Lu
97
Voted
PROCEDIA
2010
140views more  PROCEDIA 2010»
14 years 4 months ago
Theoretical enzyme design using the Kepler scientific workflows on the Grid
One of the greatest challenges in computational chemistry is the design of enzymes to catalyze non-natural chemical reactions. We focus on harnessing the distributed parallel comp...
Jianwu Wang, Prakashan Korambath, Seonah Kim, Scot...
TIM
2010
188views Education» more  TIM 2010»
14 years 4 months ago
An Effective Framework to Evaluate Dynamic Partial Reconfiguration in FPGA Systems
Abstract--The most popular representative devices of reconfigurable computing are the Field Programmable Gate Arrays (FPGAs). A promising feature of an FPGA is the ability to reuse...
Kyprianos Papadimitriou, Antonis Anyfantis, Aposto...
COMSUR
2011
218views Hardware» more  COMSUR 2011»
13 years 9 months ago
A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)
Abstract—Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol (SIP) has proven difficult. The challenge is to effectively exchange keys w...
Vijay K. Gurbani, Vladimir Kolesnikov