Sciweavers

1167 search results - page 228 / 234
» On the Evaluation of Entity Profiles
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 7 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 7 months ago
The Physical World as a Virtual Reality
This paper explores the idea that the universe is a virtual reality created by information processing, and relates this strange idea to the findings of modern physics about the ph...
Brian Whitworth
BMCBI
2006
202views more  BMCBI 2006»
13 years 7 months ago
DWARF - a data warehouse system for analyzing protein families
Background: The emerging field of integrative bioinformatics provides the tools to organize and systematically analyze vast amounts of highly diverse biological data and thus allo...
Markus Fischer, Quan K. Thai, Melanie Grieb, J&uum...
IJES
2006
110views more  IJES 2006»
13 years 7 months ago
Partitioning bin-packing algorithms for distributed real-time systems
Embedded real-time systems must satisfy not only logical functional requirements but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. W...
Dionisio de Niz, Raj Rajkumar
PAMI
2006
155views more  PAMI 2006»
13 years 7 months ago
Validating a Biometric Authentication System: Sample Size Requirements
Authentication systems based on biometric features (e.g., fingerprint impressions, iris scans, human face images, etc.) are increasingly gaining widespread use and popularity. Ofte...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain