Sciweavers

4201 search results - page 89 / 841
» Our Users have Root!
Sort
View
EUROCRYPT
2008
Springer
13 years 10 months ago
Efficient Non-interactive Proof Systems for Bilinear Groups
Non-interactive zero-knowledge proofs and non-interactive witness-indistinguishable proofs have played a significant role in the theory of cryptography. However, lack of efficienc...
Jens Groth, Amit Sahai
FORTE
2003
13 years 9 months ago
Generation of All Counter-Examples for Push-Down Systems
We present a new, on-the-fly algorithm that given a push-down model representing a sequential program with (recursive) procedure calls and an extended finite-state automaton repr...
Samik Basu, Diptikalyan Saha, Yow-Jian Lin, Scott ...
JCC
2011
154views more  JCC 2011»
12 years 11 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
RIAO
2007
13 years 9 months ago
Evaluating A Personal Information Assistant
Personal Information Assistants that search on user’s behalf aim to fetch relevant documents on a regular basis. We have developed such assistant system and evaluated it using a...
Ioannis Psarras, Joemon M. Jose
WWW
2009
ACM
14 years 8 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...