Sciweavers

2060 search results - page 326 / 412
» Some Applications of Coding Theory in Computational Complexi...
Sort
View
STORAGESS
2005
ACM
15 years 3 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
VISSYM
2007
15 years 6 days ago
Visualization Methods for Vortex Rings and Vortex Breakdown Bubbles
Vortex breakdown bubbles are a subject which is of interest in many disciplines such as aeronautics, mixing, and combustion. Existing visualization methods are based on stream sur...
Ronald Peikert, Filip Sadlo
AAAI
2006
14 years 11 months ago
SEMAPLAN: Combining Planning with Semantic Matching to Achieve Web Service Composition
Composing existing Web services to deliver new functionality is a difficult problem as it involves resolving semantic, syntactic and structural differences among the interfaces of...
Rama Akkiraju, Biplav Srivastava, Anca-Andreea Iva...
CCR
2010
156views more  CCR 2010»
14 years 10 months ago
Evolvable network architectures: what can we learn from biology?
There is significant research interest recently to understand the evolution of the current Internet, as well as to design clean-slate Future Internet architectures. Clearly, even ...
Constantine Dovrolis, J. Todd Streelman
JCC
2007
110views more  JCC 2007»
14 years 9 months ago
Improved grid-based algorithm for Bader charge allocation
: An improvement to the grid-based algorithm of Henkelman et al. for the calculation of Bader volumes is suggested, which more accurately calculates atomic properties as predicted ...
Edward Sanville, Steven D. Kenny, Roger Smith, Gra...