Sciweavers

1359 search results - page 178 / 272
» Probabilistic Points-to Analysis
Sort
View
127
Voted
ESCIENCE
2006
IEEE
15 years 6 months ago
Managing Large-Scale Workflow Execution from Resource Provisioning to Provenance Tracking: The CyberShake Example
This paper discusses the process of building an environment where large-scale, complex, scientific analysis can be scheduled onto a heterogeneous collection of computational and s...
Ewa Deelman, Scott Callaghan, Edward Field, Hunter...
SIGIR
2003
ACM
15 years 6 months ago
Text categorization by boosting automatically extracted concepts
Term-based representations of documents have found widespread use in information retrieval. However, one of the main shortcomings of such methods is that they largely disregard le...
Lijuan Cai, Thomas Hofmann
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
15 years 5 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
129
Voted
CVPR
2009
IEEE
15 years 4 months ago
Dual distributions of multilinear geometric entities
In this paper, we propose how the parameter distributions of multilinear geometric entities can be dualised. The dualisation concern, for example, the parameter distributions of c...
Sami S. Brandt
ATAL
2006
Springer
15 years 4 months ago
Monopolizing markets by exploiting trust
We investigate trust-based relationships in electronic supply chains where trust is a measure of consistency in meeting negotiated contract deadlines. We consider scenarios where ...
Sandip Sen, Dipyaman Banerjee