Sciweavers

8828 search results - page 1542 / 1766
» Formal methods in practice
Sort
View
IJACT
2008
158views more  IJACT 2008»
15 years 4 months ago
Efficient lattice-based signature scheme
: In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximat...
Thomas Plantard, Willy Susilo, Khin Than Win, Qion...
IJAR
2008
155views more  IJAR 2008»
15 years 4 months ago
Estimation of causal effects using linear non-Gaussian causal models with hidden variables
The task of estimating causal effects from non-experimental data is notoriously difficult and unreliable. Nevertheless, precisely such estimates are commonly required in many fiel...
Patrik O. Hoyer, Shohei Shimizu, Antti J. Kerminen...
IJBRA
2008
66views more  IJBRA 2008»
15 years 4 months ago
Integer programming-based approach to allocation of reporter genes for cell array analysis
Abstract Observing behaviors of protein pathways and genetic networks under various environments in living cells is essential for unraveling disease and developing drugs. For that ...
Morihiro Hayashida, Fuyan Sun, Sachiyo Aburatani, ...
GEOINFORMATICA
2006
116views more  GEOINFORMATICA 2006»
15 years 4 months ago
The Radial Topology Algorithm - A New Approach for Deriving 2.5D GIS Data Models
In this paper a new method for the combination of 2D GIS vector data and 2.5D DTM represented by triangulated irregular networks (TIN) to derive integrated triangular 2.5D object-b...
Ulrich Lenk, Christian Heipke
CE
2007
81views more  CE 2007»
15 years 4 months ago
Aptitude-treatment interactions in preservice teachers' behavior change during computer-simulated teaching
Adapting training methods to specific teacher traits to best facilitate the training effects for preservice teachers is an important, yet neglected, topic in aptitude-treatment in...
Yu-Chu Yeh
« Prev « First page 1542 / 1766 Last » Next »