Sciweavers

499 search results - page 72 / 100
» chi 2006
Sort
View
IJAHUC
2010
114views more  IJAHUC 2010»
14 years 9 months ago
Malugo: A peer-to-peer storage system
: We consider the problem of routing locality in peer-to-peer storage systems where peers store and exchange data among themselves. With the global information, peers will take the...
Yu-Wei Chan, Tsung-Hsuan Ho, Po-Chi Shih, Yeh-Chin...
JPDC
2006
117views more  JPDC 2006»
14 years 10 months ago
Efficient synthesis of out-of-core algorithms using a nonlinear optimization solver
We address the problem of efficient out-of-core code generation for a special class of imperfectly nested loops encoding tensor contractions arising in quantum chemistry computati...
Sandhya Krishnan, Sriram Krishnamoorthy, Gerald Ba...
IJNSEC
2007
130views more  IJNSEC 2007»
14 years 10 months ago
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme
In 2004, Libert and Quisquater proposed an identity based undeniable signature scheme using pairings over elliptic curves. In this article, we show that the scheme is not secure. ...
Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-M...
ICMCS
2006
IEEE
153views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Learning-Based Interactive Video Retrieval System
This paper presents an interactive video event retrieval system based on improved adaboost learning. This system consists of three main steps. Firstly, a long video sequence is pa...
Chi-Jiunn Wu, Hui-Chi Zeng, Szu-Hao Huang, Shang-H...
IRI
2006
IEEE
15 years 4 months ago
An RDF-based annotation framework for providing web resources integrity
: Data integrity of web resources is becoming more and more important with the increasing development of Internet. In the context of active intermediaries, current solution for dat...
Dejun Jiang, Chi-Hung Chi, Lin Liu