Sciweavers

3639 search results - page 621 / 728
» Provenance as Dependency Analysis
Sort
View
PRL
2007
180views more  PRL 2007»
15 years 5 days ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
80
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Topological Properties Affect the Power of Network Coding in Decentralized Broadcast
—There exists a certain level of ambiguity regarding whether network coding can further improve download performance in P2P content distribution systems, as compared to commonly ...
Di Niu, Baochun Li
IPL
2010
112views more  IPL 2010»
14 years 11 months ago
The cost of probabilistic agreement in oblivious robot networks
In this paper, we look at the time complexity of two agreement problems in networks of oblivious mobile robots, namely, at the gathering and scattering problems. Given a set of ro...
Julien Clement, Xavier Défago, Maria Gradin...
182
Voted
JASIS
2010
316views more  JASIS 2010»
14 years 11 months ago
Information sources and perceived success in corporate finance
: The work of corporate finance professionals is information intensive. In spite of that the practices and motivations of their information preferences have been researched very li...
Isto Huvila
99
Voted
MACOM
2010
14 years 11 months ago
Static Inter-Cell Interference Coordination Techniques for LTE Networks: A Fair Performance Assessment
Abstract. This paper focuses in the analysis of 100% static and distributed inter-cell interference coordination techniques in the context of LTE networks. Several methods have bee...
David González González, Mario Garc&...