Sciweavers

502 search results - page 87 / 101
» Analyzing Interacting BPEL Processes
Sort
View
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
14 years 17 days ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
BMCBI
2007
137views more  BMCBI 2007»
13 years 9 months ago
GEVALT: An integrated software tool for genotype analysis
Background: Genotype information generated by individual and international efforts carries the promise of revolutionizing disease studies and the association of phenotypes with al...
Ofir Davidovich, Gad Kimmel, Ron Shamir
ICIP
2009
IEEE
14 years 10 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
MICCAI
2003
Springer
14 years 9 months ago
Analysis Tool for Diffusion Tensor MRI
Abstract. Diffusion Tensor Imaging (DTI) is becoming a routine magnetic resonance technique to study white matter properties and alterations of fiber integrity due to pathology. Th...
Pierre Fillard, Guido Gerig
SAC
2004
ACM
14 years 2 months ago
Combining analysis and synthesis in a model of a biological cell
for ideas, and then abstract away from these ideas to produce algorithmic processes that can create problem solutions in a bottom-up manner. We have previously described a top-dow...
Ken Webb, Tony White