Sciweavers

3608 search results - page 159 / 722
» computer 2011
Sort
View
260
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
163
Voted
ASIACRYPT
2011
Springer
14 years 3 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer
BMCBI
2011
14 years 7 months ago
Computable visually observed phenotype ontological framework for plants
Background: The ability to search for and precisely compare similar phenotypic appearances within and across species has vast potential in plant science and genetic research. The ...
Jaturon Harnsomburana, Jason M. Green, Adrian S. B...
164
Voted
SIGECOM
2011
ACM
203views ECommerce» more  SIGECOM 2011»
14 years 6 months ago
Polynomial-time computation of exact correlated equilibrium in compact games
In a landmark paper, Papadimitriou and Roughgarden [2008] described a polynomial-time algorithm (“Ellipsoid Against Hope”) for computing sample correlated equilibria of concis...
Albert Xin Jiang, Kevin Leyton-Brown
172
Voted
WWW
2011
ACM
14 years 10 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...