Sciweavers

30240 search results - page 6043 / 6048
» Robust System Design
Sort
View
HUC
2011
Springer
13 years 9 months ago
Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share
As ubiquitous computing becomes increasingly mobile and social, personal information sharing will likely increase in frequency, the variety of friends to share with, and range of ...
Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cra...
IACR
2011
155views more  IACR 2011»
13 years 9 months ago
Terminating BKZ
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
Guillaume Hanrot, Xavier Pujol, Damien Stehl&eacut...
ICA
2012
Springer
13 years 5 months ago
On Revealing Replicating Structures in Multiway Data: A Novel Tensor Decomposition Approach
A novel tensor decomposition called pattern or P-decomposition is proposed to make it possible to identify replicating structures in complex data, such as textures and patterns in ...
Anh Huy Phan, Andrzej Cichocki, Petr Tichavsk&yacu...
IHI
2012
291views Healthcare» more  IHI 2012»
13 years 5 months ago
PANI: an interactive data-driven tool for target prioritization in signaling networks
Biological network analysis often aims at the target identification problem, which is to predict which molecule to inhibit (or activate) for a disease treatment to achieve optimu...
Huey-Eng Chua, Sourav S. Bhowmick, Lisa Tucker-Kel...
POPL
2012
ACM
13 years 5 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
« Prev « First page 6043 / 6048 Last » Next »