Zobrazeno 1 - 10
of 94
pro vyhledávání: '"Agnes Hui"'
Autor:
Sachie Kimura, Aleksia Vaattovaara, Tomoya Ohshita, Kotomi Yokoyama, Kota Yoshida, Agnes Hui, Hidetaka Kaya, Ai Ozawa, Mami Kobayashi, Izumi C. Mori, Yoshiyuki Ogata, Yoko Ishino, Shigeo S. Sugano, Minoru Nagano, Yoichiro Fukao
Publikováno v:
The Plant Journal.
Autor:
Bhavani Thuraisingham, Christopher Vatcher, Thomas Morris, John A. Springer, Rylan C. Chong, Alan T. Sherman, Rakesh M. Verma, Agnes Hui Chan, Susanne Wetzel, Linda Oliva, Melissa Dark
Publikováno v:
IEEE Security & Privacy. 15:72-78
Since fall 2012, several National Centers of Academic Excellence in Cyber Defense Research have fielded a collaborative course—the Information Security Research and Education (INSuRE) program—to engage students in applied cybersecurity research.
Autor:
Sarada Symonds, Michael Yessaillian, Sanket Deshpande, Amirali Sanatinia, Apoorv Munshi, Daniel Kohlbrenner, Guevara Noubir, Agnes Hui Chan
Publikováno v:
2017 IEEE International Symposium on Technologies for Homeland Security (HST).
Today, cloud computing is of paramount importance and is widely used. There have been many works illustrating the potential of narrowly focused security attacks against cloud systems, as well as elaborate mitigation techniques. However, the understan
Publikováno v:
Journal of Orthopaedic Research. 25:1269-1276
The boundary lubrication function of articular cartilage is mediated in part by proteoglycan 4 (PRG4) molecules, found both in synovial fluid (SF) and bound to the articular cartilage surface. Currently the mechanism by which PRG4 binds to the articu
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662478530
Financial Cryptography
Financial Cryptography
Although newly proposed, tree-based Oblivious RAM schemes are drastically more efficient than older techniques, they come with a significant drawback: an inherent dependence on a fixed-size database. Yet, a flexible storage is vital for real-world us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5c08bf56c3c307b29cc18a5b03e12431
https://doi.org/10.1007/978-3-662-47854-7_9
https://doi.org/10.1007/978-3-662-47854-7_9
Publikováno v:
NDSS
Publikováno v:
MILCOM
A traditional trade-off when designing a mission critical network is whether to deploy a small, dedicated network of highly reliable links (e.g. dedicated fiber) or a large-scale, distributed network of less reliable links (e.g. a leased line over th
Publikováno v:
Discrete Applied Mathematics. 46:1-20
In this paper we study the cross-correlation function values of geometric sequences obtained from q-ary m-sequences whose underlying m-sequences are linearly or quadratically related. These values are determined by counting the points of intersection
Publikováno v:
IEEE Transactions on Information Theory. 39:177-183
Pseudorandom binary sequences with high linear complexity and low correlation function values are sought in many applications of modern communication systems. A new family of pseudorandom binary sequences, cascaded GMW sequences, is constructed. Thes