Sciweavers

289 search results - page 56 / 58
» A Direct Construction of a Universal Extended H System
Sort
View
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
14 years 27 days ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
BMCBI
2010
129views more  BMCBI 2010»
13 years 8 months ago
Uncovering packaging features of co-regulated modules based on human protein interaction and transcriptional regulatory networks
Background: Network co-regulated modules are believed to have the functionality of packaging multiple biological entities, and can thus be assumed to coordinate many biological fu...
Lina Chen, Hong Wang, Liangcai Zhang, Wan Li, Qian...
COMPUTER
2002
89views more  COMPUTER 2002»
13 years 8 months ago
A Pattern for Softcoded Values
rs use models or abstractions that hide low-level implementation details. Various kinds of representations such as data models, state-transition models, and dataflow models can hel...
Michael R. Blaha, Cheryl Smith
CHI
2010
ACM
14 years 3 months ago
Bringing the field into focus: user-centered design of a patient expertise locator
Managing personal aspects of health is challenging for many patients, particularly those facing a serious condition such as cancer. Finding experienced patients, who can share the...
Andrea Civan-Hartzler, David W. McDonald, Chris Po...
CIKM
2010
Springer
13 years 7 months ago
Learning to rank relevant and novel documents through user feedback
We consider the problem of learning to rank relevant and novel documents so as to directly maximize a performance metric called Expected Global Utility (EGU), which has several de...
Abhimanyu Lad, Yiming Yang