Sciweavers

34181 search results - page 6626 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
AUTONOMICS
2008
ACM
15 years 6 months ago
Autonomic management via dynamic combinations of reusable strategies
Autonomic Management capabilities become increasingly important for attaining functional and quality goals in software systems. Nonetheless, successful Autonomic Management soluti...
Ada Diaconescu, Yoann Maurel, Philippe Lalanda
BMEI
2008
IEEE
15 years 6 months ago
Clustering of High-Dimensional Gene Expression Data with Feature Filtering Methods and Diffusion Maps
The importance of gene expression data in cancer diagnosis and treatment by now has been widely recognized by cancer researchers in recent years. However, one of the major challen...
Rui Xu, Steven Damelin, Boaz Nadler, Donald C. Wun...
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 6 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
CCS
2008
ACM
15 years 6 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
ISBMS
2010
Springer
15 years 6 months ago
A Point-Based Simulation Framework for Minimally Invasive Surgery
In this paper, we present a physically-based simulation framework to build up real-time Minimally invasive surgery (MIS) simulators using pointbased techniques. In our framework, s...
Bo Zhu, Lixu Gu, Xiaopeng Peng, Zhe Zhou
« Prev « First page 6626 / 6837 Last » Next »