Sciweavers

4302 search results - page 712 / 861
» Index Pairs Algorithms
Sort
View
ASIACRYPT
2005
Springer
14 years 2 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
CIKM
2005
Springer
14 years 2 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
FC
2005
Springer
171views Cryptology» more  FC 2005»
14 years 2 months ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu
GCB
2005
Springer
98views Biometrics» more  GCB 2005»
14 years 2 months ago
Composite Module Analyst: A Fitness-Based Tool for Prediction of Transcription Regulation
: Functionally related genes involved in the same molecular-genetic, biochemical, or physiological process are often regulated coordinately Such regulation is provided by precisely...
Alexander E. Kel, Tatiana Konovalova, Tagir Valeev...
GFKL
2005
Springer
105views Data Mining» more  GFKL 2005»
14 years 2 months ago
Variable Selection for Discrimination of More Than Two Classes Where Data are Sparse
In classification, with an increasing number of variables, the required number of observations grows drastically. In this paper we present an approach to put into effect the maxi...
Gero Szepannek, Claus Weihs