Sciweavers

3836 search results - page 756 / 768
» Optimizing the Use of High Performance Software Libraries
Sort
View
EUROCRYPT
2004
Springer
14 years 28 days ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
BMCBI
2010
152views more  BMCBI 2010»
13 years 7 months ago
FITBAR: a web tool for the robust prediction of prokaryotic regulons
Background: The binding of regulatory proteins to their specific DNA targets determines the accurate expression of the neighboring genes. The in silico prediction of new binding s...
Jacques Oberto
BMCBI
2007
142views more  BMCBI 2007»
13 years 7 months ago
Predicting and improving the protein sequence alignment quality by support vector regression
Background: For successful protein structure prediction by comparative modeling, in addition to identifying a good template protein with known structure, obtaining an accurate seq...
Minho Lee, Chan-seok Jeong, Dongsup Kim
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Hierarchical routing over dynamic wireless networks
Dynamic networks are those where the topology changes over time and therefore efficient routes need to be maintained by frequent updates. Such updates could be costly in terms of ...
Dominique Tschopp, Suhas N. Diggavi, Matthias Gros...
PAMI
2007
245views more  PAMI 2007»
13 years 7 months ago
Conformal Geometry and Its Applications on 3D Shape Matching, Recognition, and Stitching
—Three-dimensional shape matching is a fundamental issue in computer vision with many applications such as shape registration, 3D object recognition, and classification. However,...
Sen Wang, Yang Wang, Miao Jin, Xianfeng David Gu, ...