Sciweavers

1995 search results - page 195 / 399
» Adaptive Information Filtering using Evolutionary Computatio...
Sort
View
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
13 years 11 months ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...
GI
2009
Springer
13 years 12 months ago
Strategic Interaction Definition Language
: Managing general game playing is the problem addressed in this paper. It is considered to be done on a game description written in a declarative language. The language, which is ...
Rustam Tagiew
CHI
1994
ACM
13 years 11 months ago
Toolglass and magic lenses: the see-through interface
ToolglassTM widgets are new user interface tools that can appear, as though on a transparent sheet of glass, between an application and a traditional cursor. They can be positione...
Eric A. Bier, Maureen C. Stone, Kenneth A. Pier, K...
CIBCB
2007
IEEE
14 years 1 days ago
Prediction of Enzyme Catalytic Sites from Sequence Using Neural Networks
The accurate prediction of enzyme catalytic sites remains an open problem in bioinformatics. Recently, several structure-based methods have become popular; however, few robust seq...
Swati Pande, Amar Raheja, Dennis R. Livesay
ICPR
2000
IEEE
14 years 14 days ago
Biometric Personal Identification Based on Iris Patterns
A new system for personal identification based on iris patterns is presented in this paper. It is composed of iris image acquisition, image preprocessing, feature extraction and c...
Yong Zhu, Tieniu Tan, Yunhong Wang