51![Experimental Quantum Fingerprinting Feihu Xu,1, ∗ Juan Miguel Arrazola,2, ∗ Kejin Wei,1, 3 Wenyuan Wang,1, 4 Pablo Palacios-Avila,2, 5 Chen Feng,6 Shihan Sajeed,2 Norbert L¨utkenhaus,2 and Hoi-Kwong Lo1 1 Center for Experimental Quantum Fingerprinting Feihu Xu,1, ∗ Juan Miguel Arrazola,2, ∗ Kejin Wei,1, 3 Wenyuan Wang,1, 4 Pablo Palacios-Avila,2, 5 Chen Feng,6 Shihan Sajeed,2 Norbert L¨utkenhaus,2 and Hoi-Kwong Lo1 1 Center for](https://www.pdfsearch.io/img/18864be6199892af4c5fa1b60297d22c.jpg) | Add to Reading ListSource URL: 2015.qcrypt.netLanguage: English - Date: 2015-09-14 07:32:42
|
---|
52![Accelerating Fully Homomorphic Encryption on GPUs Wei Wang,Yin Hu,Lianmu Chen,Xinming Huang and Berk Sunar Department of Electrial and Computer Engineering Worcester Polytechnic Institute, Worcester, MA, USA weiwang@ece. Accelerating Fully Homomorphic Encryption on GPUs Wei Wang,Yin Hu,Lianmu Chen,Xinming Huang and Berk Sunar Department of Electrial and Computer Engineering Worcester Polytechnic Institute, Worcester, MA, USA weiwang@ece.](https://www.pdfsearch.io/img/756c3e982cb61063b84a504adddde43c.jpg) | Add to Reading ListSource URL: ecewp.ece.wpi.eduLanguage: English - Date: 2012-11-29 11:41:35
|
---|
53![Active Error Detection and Resolution for Speech-to-Speech Translation Rohit Prasad, Rohit Kumar, Sankaranarayanan Ananthakrishnan, Wei Chen, Sanjika Hewavitharana, Matthew Roy, Frederick Choi, Aaron Challenner, Enoch Ka Active Error Detection and Resolution for Speech-to-Speech Translation Rohit Prasad, Rohit Kumar, Sankaranarayanan Ananthakrishnan, Wei Chen, Sanjika Hewavitharana, Matthew Roy, Frederick Choi, Aaron Challenner, Enoch Ka](https://www.pdfsearch.io/img/f4152e2846c7f230fe80f548bdc57466.jpg) | Add to Reading ListSource URL: people.cs.umass.eduLanguage: English - Date: 2015-01-06 13:26:25
|
---|
54![Efficient Rate-Adaptive Reconciliation in Quantum Key Distribution Patcharapong Treeviriyanupab 1, Tharathorn Phromsa-ard 2, Jutaphet Wetcharungsri 3, Paramin Sangwongngam 3, Chun-Mei Zhang 4, Mo Li 4, Wei Chen 4, and Zh Efficient Rate-Adaptive Reconciliation in Quantum Key Distribution Patcharapong Treeviriyanupab 1, Tharathorn Phromsa-ard 2, Jutaphet Wetcharungsri 3, Paramin Sangwongngam 3, Chun-Mei Zhang 4, Mo Li 4, Wei Chen 4, and Zh](https://www.pdfsearch.io/img/a936d62ef89766c75b1d8dd944705616.jpg) | Add to Reading ListSource URL: 2015.qcrypt.netLanguage: English - Date: 2015-09-22 01:48:26
|
---|
55![Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis∗ Chuanxiong Guo, Lihua Yuan, Dong Xiang, Yingnong Dang, Ray Huang, Dave Maltz, Zhaoyi Liu, Vin Wang, Bin Pang, Hua Chen, Zhi-Wei L Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis∗ Chuanxiong Guo, Lihua Yuan, Dong Xiang, Yingnong Dang, Ray Huang, Dave Maltz, Zhaoyi Liu, Vin Wang, Bin Pang, Hua Chen, Zhi-Wei L](https://www.pdfsearch.io/img/acface9115e70d4e89d33bd5aa645cb0.jpg) | Add to Reading ListSource URL: conferences.sigcomm.orgLanguage: English - Date: 2015-07-29 16:54:57
|
---|
56![Four Types of Masques Spear Phishing Attacks against iOS Tao (Lenx) Wei, Zhaofeng Chen, Hui Xue FireEye Labs Copyright
©
2015,
FireEye,
Inc.
All
rights
reserved.
Four Types of Masques Spear Phishing Attacks against iOS Tao (Lenx) Wei, Zhaofeng Chen, Hui Xue FireEye Labs Copyright
©
2015,
FireEye,
Inc.
All
rights
reserved.](https://www.pdfsearch.io/img/bb66d77d0dc5ef0bcf97837e4937af60.jpg) | Add to Reading ListSource URL: www.thecyberwire.comLanguage: English - Date: 2015-05-27 08:23:19
|
---|
57![Enforcing Routing Consistency in Structured Peer-to-Peer Overlays: Should We and Could We? Wei Chen Xuezheng Liu Microsoft Research Asia {weic, xueliu}@microsoft.com Enforcing Routing Consistency in Structured Peer-to-Peer Overlays: Should We and Could We? Wei Chen Xuezheng Liu Microsoft Research Asia {weic, xueliu}@microsoft.com](https://www.pdfsearch.io/img/085b8fa121622cbbeaaeea4fd04d9828.jpg) | Add to Reading ListSource URL: iptps06.cs.ucsb.eduLanguage: English - Date: 2006-02-15 01:41:08
|
---|
58![A Privacy Reinforcement Approach against De-identified Dataset Ci-Wei Lan Yi-Hui Chen A Privacy Reinforcement Approach against De-identified Dataset Ci-Wei Lan Yi-Hui Chen](https://www.pdfsearch.io/img/2b7cd689e2d7c3ca69c2ce48a8f78933.jpg) | Add to Reading ListSource URL: www.tyronegrandison.orgLanguage: English - Date: 2013-04-03 13:52:47
|
---|
59![](/pdf-icon.png) | Add to Reading ListSource URL: www.econ.tku.edu.tw- Date: 2012-05-27 10:00:14
|
---|
60![Planning for the Change: Mapping Sea Level Rise and Storm Inundation in Sherman Island Using 3Di Hydrodynamic Model and LiDAR Yang Ju1, Wei-Chen Hsu1, John D. Radke1, 2, William L. Fourt1, Wei Lang3, Olivier Hoes4, Howar Planning for the Change: Mapping Sea Level Rise and Storm Inundation in Sherman Island Using 3Di Hydrodynamic Model and LiDAR Yang Ju1, Wei-Chen Hsu1, John D. Radke1, 2, William L. Fourt1, Wei Lang3, Olivier Hoes4, Howar](https://www.pdfsearch.io/img/2eb9162694fedf70fd3d6d96fec77a29.jpg) | Add to Reading ListSource URL: dl.dropboxusercontent.comLanguage: English |
---|