Sciweavers

31387 search results - page 6180 / 6278
» Abstracting abstract machines
Sort
View
ASIACRYPT
2010
Springer
13 years 7 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
BIBM
2010
IEEE
157views Bioinformatics» more  BIBM 2010»
13 years 7 months ago
Decomposing PPI networks for complex discovery
Abstract--Protein complexes are important for understanding principles of cellular organization and functions. With the availability of large amounts of high-throughput proteinprot...
Guimei Liu, Chern Han Yong, Limsoon Wong, Hon Nian...
BIBM
2010
IEEE
158views Bioinformatics» more  BIBM 2010»
13 years 7 months ago
Protein-protein interaction prediction via Collective Matrix Factorization
Abstract--Protein-protein interactions (PPI) play an important role in cellular processes and metabolic processes within a cell. An important task is to determine the existence of ...
Qian Xu, Evan Wei Xiang, Qiang Yang
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 7 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CEC
2010
IEEE
13 years 7 months ago
Beating the 'world champion' evolutionary algorithm via REVAC tuning
Abstract-- We present a case study demonstrating that using the REVAC parameter tuning method we can greatly improve the `world champion' EA (the winner of the CEC2005 competi...
Selmar K. Smit, A. E. Eiben
« Prev « First page 6180 / 6278 Last » Next »