Sciweavers

3608 search results - page 243 / 722
» computer 2011
Sort
View
CORR
2011
Springer
173views Education» more  CORR 2011»
14 years 11 months ago
Exploiting symmetries in SDP-relaxations for polynomial optimization
Abstract. We consider the issue of exploiting symmetries in the hierarchy of semidefinite programming relaxations recently introduced in polynomial optimization. We focus on probl...
Cordian Riener, Thorsten Theobald, Lina Jansson An...
COMSUR
2011
264views Hardware» more  COMSUR 2011»
14 years 4 months ago
Low-Memory Wavelet Transforms for Wireless Sensor Networks: A Tutorial
Abstract—The computational and memory resources of wireless sensor nodes are typically very limited, as the employed low-energy microcontrollers provide only hardware support for...
Stephan Rein, Martin Reisslein
CSFW
2011
IEEE
14 years 4 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
COMPUTING
2011
14 years 11 months ago
Private cloud for collaboration and e-Learning services: from IaaS to SaaS
Abstract The idea behind Cloud Computing is to deliver Infrastructure-, Platformand Software-as-a-Service (IaaS, PaaS and SaaS) over the Internet on an easy payper-use business mod...
Frank Dölitzscher, Anthony Sulistio, Christop...
ICONFERENCE
2011
14 years 11 months ago
Loose strands: searching for evidence of public access ICT impact on development
Telecenters, libraries and internet cafés are often credited as being important venues for making information and communication technologies (ICTs) more widely available for peop...
Araba Sey, Michelle Fellows