Sciweavers

3608 search results - page 156 / 722
» computer 2011
Sort
View
221
Voted
CODASPY
2011
14 years 7 months ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu
159
Voted
IACR
2011
128views more  IACR 2011»
14 years 3 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang
173
Voted
PLDI
2011
ACM
14 years 6 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
64
Voted
TIT
2011
111views more  TIT 2011»
14 years 10 months ago
Counting Partial Spread Functions in Eight Variables
Abstract. In this note we report the following computational results on partial spread functions in 8 variables: (i) the numbers of equivalence classes of partial spread functions ...
Philippe Langevin, Xiang-dong Hou
167
Voted
CGF
2011
14 years 7 months ago
Computer-Suggested Facial Makeup
Finding the best makeup for a given human face is an art in its own right. Experienced makeup artists train for years to be skilled enough to propose a best-fit makeup for an ind...
Kristina Scherbaum, Tobias Ritschel, Matthias B. H...