Sciweavers

330 search results - page 56 / 66
» On the Notion of Pseudo-Free Groups
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 10 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
CHI
2004
ACM
14 years 10 months ago
All together now: visualizing local and remote actors of localized activity
We present All Together Now (ATN), a tool for visualizing localized activities involving both local and remote actors. ATN presents each user with a webpage containing a common vi...
Scott Lederer, Jeffrey Heer
RECOMB
2005
Springer
14 years 10 months ago
Combinatorial Genetic Regulatory Network Analysis Tools for High Throughput Transcriptomic Data
: A series of genome-scale algorithms and high-performance implementations is described and shown to be useful in the genetic analysis of gene transcription. With them it is possib...
Elissa J. Chesler, Michael A. Langston
VLDB
2007
ACM
121views Database» more  VLDB 2007»
14 years 9 months ago
Ranked Subsequence Matching in Time-Series Databases
Existing work on similar sequence matching has focused on either whole matching or range subsequence matching. In this paper, we present novel methods for ranked subsequence match...
Wook-Shin Han, Jinsoo Lee, Yang-Sae Moon, Haifeng ...
ICSE
2004
IEEE-ACM
14 years 9 months ago
Toward Undoing in Composite Web Services
Cancelling or reversing the effect of a former action is a necessity in most interactive systems. The simplest and most frequent form of this facility is the "undo" comma...
Marie-Claude Gaudel