Sciweavers

1995 search results - page 195 / 399
» Adaptive Information Filtering using Evolutionary Computatio...
Sort
View
157
Voted
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
15 years 6 months ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...
186
Voted
GI
2009
Springer
15 years 6 months ago
Strategic Interaction Definition Language
: Managing general game playing is the problem addressed in this paper. It is considered to be done on a game description written in a declarative language. The language, which is ...
Rustam Tagiew
133
Voted
CHI
1994
ACM
15 years 6 months ago
Toolglass and magic lenses: the see-through interface
ToolglassTM widgets are new user interface tools that can appear, as though on a transparent sheet of glass, between an application and a traditional cursor. They can be positione...
Eric A. Bier, Maureen C. Stone, Kenneth A. Pier, K...
146
Voted
CIBCB
2007
IEEE
15 years 6 months ago
Prediction of Enzyme Catalytic Sites from Sequence Using Neural Networks
The accurate prediction of enzyme catalytic sites remains an open problem in bioinformatics. Recently, several structure-based methods have become popular; however, few robust seq...
Swati Pande, Amar Raheja, Dennis R. Livesay
109
Voted
ICPR
2000
IEEE
15 years 7 months ago
Biometric Personal Identification Based on Iris Patterns
A new system for personal identification based on iris patterns is presented in this paper. It is composed of iris image acquisition, image preprocessing, feature extraction and c...
Yong Zhu, Tieniu Tan, Yunhong Wang