Sciweavers

2409 search results - page 99 / 482
» Building Components from Functions
Sort
View
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
14 years 4 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
TIP
2008
175views more  TIP 2008»
13 years 10 months ago
Customizing Kernel Functions for SVM-Based Hyperspectral Image Classification
Previous research applying kernel methods such as support vector machines (SVMs) to hyperspectral image classification has achieved performance competitive with the best available ...
Baofeng Guo, Steve R. Gunn, Robert I. Damper, Jame...
NAR
2010
107views more  NAR 2010»
13 years 5 months ago
FlyTF: improved annotation and enhanced functionality of the Drosophila transcription factor database
FlyTF (http://www.flytf.org) is a database of computationally predicted and/or experimentally verified site-specific transcription factors (TFs) in the fruit fly Drosophila melano...
Ulrike Pfreundt, Daniel P. James, Susan Tweedie, D...
DRM
2003
Springer
14 years 3 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
TACAS
2005
Springer
113views Algorithms» more  TACAS 2005»
14 years 4 months ago
jETI: A Tool for Remote Tool Integration
Abstract. We present jETI, a redesign of the Electronic Tools Integration platform (ETI), that addresses the major issues and concerns accumulated over seven years of experience wi...
Tiziana Margaria, Ralf Nagel, Bernhard Steffen