Sciweavers

6279 search results - page 1200 / 1256
» Studies in Solution Sampling
Sort
View
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
15 years 3 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
ESA
2004
Springer
145views Algorithms» more  ESA 2004»
15 years 3 months ago
Flows on Few Paths: Algorithms and Lower Bounds
Abstract. Classical network flow theory allows decomposition of flow into several chunks of arbitrary sizes traveling through the network on different paths. In the first part ...
Maren Martens, Martin Skutella
ICCS
2004
Springer
15 years 3 months ago
Computational Engineering and Science Program at the University of Utah
We summarize the Computational Engineering and Science program at the University of Utah. Program requirements as well as related research areas are outlined. To obtain the MS degr...
Carleton DeTar, Aaron L. Fogelson, Christopher R. ...
ICSOC
2004
Springer
15 years 3 months ago
Flexible coordination of service interaction patterns
Service-oriented computing is meant to support loose relationships between organisations: Collaboration procedures on the application-level translate to interaction processes via ...
Christian Zirpins, Winfried Lamersdorf, Toby Baier
IMR
2004
Springer
15 years 3 months ago
Mesh Movement Governed by Entropy Production
The aim of this paper is to study the feasibility of using (irreversible) entropy production as driving force for a moving mesh. Such a method should be able to capture or track p...
Edwin M. Knobbe
« Prev « First page 1200 / 1256 Last » Next »