Sciweavers

886 search results - page 159 / 178
» Generalized Bezout Identity
Sort
View
WPES
2005
ACM
14 years 1 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
EGOV
2005
Springer
14 years 1 months ago
An Infrastructural Approach to Secure Interoperability of Electronic IDs: The Bridging Backbone
In this paper we propose a solution to secure interoperability between electronic ID management infrastructures enabling the provision of cross-border eServices to mobile citizens....
Franco Arcieri, Andrea Dimitri, Fabio Fioravanti, ...
FPGA
2005
ACM
97views FPGA» more  FPGA 2005»
14 years 1 months ago
Techniques for synthesizing binaries to an advanced register/memory structure
Recent works demonstrate several benefits of synthesizing software binaries onto FPGA hardware, including incorporating hardware design into established software tool flows with m...
Greg Stitt, Zhi Guo, Walid A. Najjar, Frank Vahid
GECCO
2005
Springer
124views Optimization» more  GECCO 2005»
14 years 1 months ago
Evolving petri nets to represent metabolic pathways
Given concentrations of metabolites over a sequence of time steps, the metabolic pathway prediction problem seeks a set of reactions and rate constants for them that could yield t...
Jeremiah Nummela, Bryant A. Julstrom
GECCO
2005
Springer
156views Optimization» more  GECCO 2005»
14 years 1 months ago
Extraction of informative genes from microarray data
Identification of those genes that might anticipate the clinical behavior of different types of cancers is challenging due to availability of a smaller number of patient samples...
Topon Kumar Paul, Hitoshi Iba