Sciweavers

242 search results - page 23 / 49
» Provenance for Computational Tasks: A Survey
Sort
View
EUROCRYPT
1999
Springer
15 years 2 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
ICSNC
2007
IEEE
15 years 4 months ago
Programming Approaches and Challenges for Wireless Sensor Networks
Wireless sensor networks (WSNs) constitute a new pervasive and ubiquitous technology. They have been successfully used in various application areas and in future computing environ...
Bartolomé Rubio, Manuel Díaz, Jos&ea...
IPPS
2009
IEEE
15 years 4 months ago
Minimizing startup costs for performance-critical threading
—Using the well-known ATLAS and LAPACK dense linear algebra libraries, we demonstrate that the parallel management overhead (PMO) can grow with problem size on even statically sc...
Anthony M. Castaldo, R. Clint Whaley
ICCV
2009
IEEE
1318views Computer Vision» more  ICCV 2009»
16 years 2 months ago
Non-Local Sparse Models for Image Restoration
We propose in this paper to unify two different ap- proaches to image restoration: On the one hand, learning a basis set (dictionary) adapted to sparse signal descriptions has p...
Julien Mairal, Francis Bach, Jean Ponce, Guillermo...
CHI
2005
ACM
15 years 10 months ago
Visualization in law enforcement
Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at th...
Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron...