Sciweavers

29079 search results - page 5811 / 5816
» Design Of Future Systems
Sort
View
IACR
2011
155views more  IACR 2011»
12 years 10 months ago
Terminating BKZ
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
Guillaume Hanrot, Xavier Pujol, Damien Stehl&eacut...
ICA
2012
Springer
12 years 6 months ago
On Revealing Replicating Structures in Multiway Data: A Novel Tensor Decomposition Approach
A novel tensor decomposition called pattern or P-decomposition is proposed to make it possible to identify replicating structures in complex data, such as textures and patterns in ...
Anh Huy Phan, Andrzej Cichocki, Petr Tichavsk&yacu...
IHI
2012
291views Healthcare» more  IHI 2012»
12 years 6 months ago
PANI: an interactive data-driven tool for target prioritization in signaling networks
Biological network analysis often aims at the target identification problem, which is to predict which molecule to inhibit (or activate) for a disease treatment to achieve optimu...
Huey-Eng Chua, Sourav S. Bhowmick, Lisa Tucker-Kel...
POPL
2012
ACM
12 years 6 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
SIGSOFT
2012
ACM
12 years 6 months ago
Report from the 2nd international workshop on replication in empirical software engineering research (RESER 2011)
The RESER workshop provides a venue in which empirical software engineering researchers can discuss the theoretical foundations and methods of replication, as well as present the ...
Jonathan L. Krein, Charles D. Knutson, Lutz Preche...
« Prev « First page 5811 / 5816 Last » Next »