Sciweavers

788 search results - page 120 / 158
» Physics of the shannon limits
Sort
View
ICDE
2011
IEEE
233views Database» more  ICDE 2011»
14 years 1 months ago
Answering approximate string queries on large data sets using external memory
— An approximate string query is to find from a collection of strings those that are similar to a given query string. Answering such queries is important in many applications su...
Alexander Behm, Chen Li, Michael J. Carey
ESSOS
2011
Springer
14 years 1 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
INFOCOM
2011
IEEE
14 years 1 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
NAR
2011
223views Computer Vision» more  NAR 2011»
14 years 18 days ago
HitPredict: a database of quality assessed protein-protein interactions in nine species
Despite the availability of a large number of protein– protein interactions (PPIs) in several species, researchers are often limited to using very small subsets in a few organis...
Ashwini Patil, Kenta Nakai, Haruki Nakamura
ICCV
2011
IEEE
13 years 9 months ago
Object Recoloring based on Intrinsic Image Estimation
Object recoloring is one of the most popular photoediting tasks. The problem of object recoloring is highly under-constrained, and existing recoloring methods limit their applicat...
Shida Beigpour, Joost van de Weijer