Sciweavers

104 search results - page 18 / 21
» A Canonical Scheme for Model Composition
Sort
View
TCAD
1998
127views more  TCAD 1998»
13 years 7 months ago
Gate-level power estimation using tagged probabilistic simulation
In this paper, we present a probabilistic simulation technique to estimate the power consumption of a cmos circuit under a general delay model. This technique is based on the noti...
Chih-Shun Ding, Chi-Ying Tsui, Massoud Pedram
BMCBI
2004
113views more  BMCBI 2004»
13 years 7 months ago
Oligo kernels for datamining on biological sequences: a case study on prokaryotic translation initiation sites
Background: Kernel-based learning algorithms are among the most advanced machine learning methods and have been successfully applied to a variety of sequence classification tasks ...
Peter Meinicke, Maike Tech, Burkhard Morgenstern, ...
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
13 years 6 months ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
ICIP
1998
IEEE
14 years 9 months ago
Semantic Visual Templates: Linking Visual Features to Semantics
The rapid growth of visual data over the last few years has lead to many schemes for retrieving such data. With content-based systems today, there exists a significant gap between...
Shih-Fu Chang, William Chen, Hari Sundaram
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 8 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner