Sciweavers

290 search results - page 51 / 58
» On the relationship between squared pairings and plain pairi...
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Analyzing DISH for multi-channel MAC protocols in wireless networks
For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in...
Tie Luo, Mehul Motani, Vikram Srinivasan
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 1 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
PODS
2010
ACM
223views Database» more  PODS 2010»
13 years 9 months ago
Characterizing schema mappings via data examples
Schema mappings are high-level specifications that describe the relationship between two database schemas; they are considered to be the essential building blocks in data exchange...
Bogdan Alexe, Phokion G. Kolaitis, Wang Chiew Tan
ALMOB
2008
160views more  ALMOB 2008»
13 years 7 months ago
Syntenator: Multiple gene order alignments with a gene-specific scoring function
Background: Identification of homologous regions or conserved syntenies across genomes is one crucial step in comparative genomics. This task is usually performed by genome alignm...
Christian Rödelsperger, Christoph Dieterich
BMCBI
2010
117views more  BMCBI 2010»
13 years 7 months ago
Extracting causal relations on HIV drug resistance from literature
Background: In HIV treatment it is critical to have up-to-date resistance data of applicable drugs since HIV has a very high rate of mutation. These data are made available throug...
Quoc-Chinh Bui, Breanndán Ó Nuall&aa...