Sciweavers

20059 search results - page 3871 / 4012
» The Satellite Data Model
Sort
View
JOC
2010
124views more  JOC 2010»
14 years 11 months ago
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
We present a new encryption scheme which is secure against adaptive chosenciphertext attack (or CCA2-secure) in the standard model (i.e. without the use of random oracle). Our sch...
Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Vict...
JOCN
2010
86views more  JOCN 2010»
14 years 11 months ago
Neural Basis of Repetition Priming during Mathematical Cognition: Repetition Suppression or Repetition Enhancement?
■ We investigated the neural basis of repetition priming (RP) during mathematical cognition. Previous studies of RP have focused on repetition suppression as the basis of behavi...
Valorie N. Salimpoor, Catie Chang, Vinod Menon
JSAC
2010
107views more  JSAC 2010»
14 years 11 months ago
Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications
Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Hsien-Po Shiang, Mihaela van der Schaar
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
14 years 11 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
PVLDB
2010
134views more  PVLDB 2010»
14 years 11 months ago
High-Performance Dynamic Pattern Matching over Disordered Streams
Current pattern-detection proposals for streaming data recognize the need to move beyond a simple regular-expression model over strictly ordered input. We continue in this directi...
Badrish Chandramouli, Jonathan Goldstein, David Ma...
« Prev « First page 3871 / 4012 Last » Next »