Sciweavers

4762 search results - page 952 / 953
» About the use of protein models
Sort
View
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
SIGIR
2012
ACM
11 years 10 months ago
Time-based calibration of effectiveness measures
Many current effectiveness measures incorporate simplifying assumptions about user behavior. These assumptions prevent the measures from reflecting aspects of the search process...
Mark D. Smucker, Charles L. A. Clarke
CVPR
2012
IEEE
11 years 10 months ago
A learning based deformable template matching method for automatic rib centerline extraction and labeling in CT images
The automatic extraction and labeling of the rib centerlines is a useful yet challenging task in many clinical applications. In this paper, we propose a new approach integrating r...
Dijia Wu, David Liu, Zoltan Puskas, Chao Lu, Andre...
EUROSYS
2010
ACM
14 years 1 months ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen
MOBICOM
2004
ACM
14 years 28 days ago
Practical robust localization over large-scale 802.11 wireless networks
We demonstrate a system built using probabilistic techniques that allows for remarkably accurate localization across our entire office building using nothing more than the built-...
Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd,...