• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 25,738
Next 10 →

Secure Group Communications Using Key Graphs

by Chung Kei Wong, Mohamed Gouda , Simon S. Lam - SIGCOMM '98 , 1998
"... Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of au ..."
Abstract - Cited by 556 (17 self) - Add to MetaCart
management. We formalize the notion of a secure group as a triple (U; K;R) where U denotes a set of users, K a set of keys held by the users, and R a user-key relation. We then introduce key graphs to specify secure groups. For a special class of key graphs, we present three strategies for securely

Hierarchical model-based motion estimation

by James R. Bergen, P. Anandan, Th J. Hanna, Rajesh Hingorani , 1992
"... This paper describes a hierarchical estimation framework for the computation of diverse representations of motion information. The key features of the resulting framework (or family of algorithms) a,re a global model that constrains the overall structure of the motion estimated, a local rnodel that ..."
Abstract - Cited by 664 (15 self) - Add to MetaCart
This paper describes a hierarchical estimation framework for the computation of diverse representations of motion information. The key features of the resulting framework (or family of algorithms) a,re a global model that constrains the overall structure of the motion estimated, a local rnodel

MATRIX FACTORIZATION TECHNIQUES FOR RECOMMENDER SYSTEMS

by Yehuda Koren, Robert Bell, Chris Volinsky - IEEE COMPUTER , 2009
"... As the Netflix Prize competition has demonstrated, matrix factorization models are superior to classic nearest-neighbor techniques for producing product recommendations, allowing the incorporation of additional information such as implicit feedback, temporal effects, and confidence levels. Modern co ..."
Abstract - Cited by 593 (4 self) - Add to MetaCart
consumers are inundated with choices. Electronic retailers and content providers offer a huge selection of products, with unprecedented opportunities to meet a variety of special needs and tastes. Matching consumers with the most appropriate products is key to enhancing user satisfaction and loyalty

Teachers are the key: Strategies for instructional improvement

by Lynette Virgona
"... professional learning program operated by accredited classroom teachers for the Department of ..."
Abstract - Add to MetaCart
professional learning program operated by accredited classroom teachers for the Department of

Global burden of cardiovascular diseases: part I: general considerations, the epidemiologic transition, risk factors, and impact of urbanization. Circulation

by Salim Yusuf, Dphil Srinath Reddy, Md Stephanie Ôunpuu, Phd Sonia An
"... Abstract—This two-part article provides an overview of the global burden of atherothrombotic cardiovascular disease. Part I initially discusses the epidemiologic transition which has resulted in a decrease in deaths in childhood due to infections, with a concomitant increase in cardiovascular and ot ..."
Abstract - Cited by 420 (5 self) - Add to MetaCart
and other chronic diseases; and then provides estimates of the burden of cardiovascular (CV) diseases with specific focus on the developing countries. Next, we summarize key information on risk factors for cardiovascular disease (CVD) and indicate that their importance may have been underestimated. Then, we

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing,

by E Damiani , S De Capitani Di Vimercati , S Foresti , S J Aj O D I A , S Paraboschi , P Samarati - IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, , 2007
"... Abstract. Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsourced data from unauthorized accesses, even from the (honest but curious) host server, data are encrypted and i ..."
Abstract - Cited by 6 (4 self) - Add to MetaCart
propose different multi-key data encryption strategies for enforcing access privileges. Our strategies exploit different keys, which are distributed to the users, corresponding to the different authorizations. We then present some experiments evaluating the quality of the proposed strategies with respect

Remanufacturing: A Key Strategy for Sustainable Development

by Winifred L. Ijomah, Steve Childe, Chris Mcmahon
"... Remanufacturing is a process of bringing used products to “like-new ” functional state with warranty to match. It recovers a substantial proportion of the resource incorporated in a used product in its first manufacture, at low additional cost, thus reducing the price of the resulting product. The k ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
. The key remanufacturing problem is the ambiguity in its definition leading to paucity of knowledge and research in the process. Also, few remanufacturing tools and techniques have been developed to improve its efficiency and effectiveness. This paper addresses these issues by describing the findings of in

Brazilian Open Access Initiatives: Key Strategies and Actions

by Sely M S Costa Fern, O C L Leite
"... This overview of key Open Access (OA) strategies in Brazil over the last three years describes the guidelines, tools and methodologies needed for Brazil to become an effective actor in the worldwide open access movement. We review general trends and awareness of OA, as well as ongoing developments a ..."
Abstract - Add to MetaCart
This overview of key Open Access (OA) strategies in Brazil over the last three years describes the guidelines, tools and methodologies needed for Brazil to become an effective actor in the worldwide open access movement. We review general trends and awareness of OA, as well as ongoing developments

Educator Evaluation Team: Three Key Strategies Teach

by unknown authors , 2014
"... Our core strategies Prepare all students for success after high school by: Improving educator effectiveness Strengthening curriculum, instruction, and assessment Turning around the lowest performing districts and schools Using data and technology to support student performance ..."
Abstract - Add to MetaCart
Our core strategies Prepare all students for success after high school by: Improving educator effectiveness Strengthening curriculum, instruction, and assessment Turning around the lowest performing districts and schools Using data and technology to support student performance

FUTURE PATHS FOR INTEGER PROGRAMMING AND LINKS TO Artificial Intelligence

by Fred Glover , 1986
"... Scope and Purpose-A summary is provided of some of the recent (and a few not-so-recent) developments that otTer promise for enhancing our ability to solve combinatorial optimization problems. These developments may be usefully viewed as a synthesis of the perspectives of operations research and arti ..."
Abstract - Cited by 379 (8 self) - Add to MetaCart
and operations research. To demonstrate this, four key areas are examined: (1) controlled randomization, (2) learning strategies, (3) induced decomposition and (4) tabu search. Each of these is shown to have characteristics that appear usefully relevant to developments on the horizon.
Next 10 →
Results 1 - 10 of 25,738
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University