Sciweavers

10995 search results - page 2155 / 2199
» Positioning
Sort
View
ACSAC
2010
IEEE
15 years 6 days ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
128
Voted
ASIACRYPT
2010
Springer
15 years 5 days ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
140
Voted
ASIACRYPT
2010
Springer
15 years 5 days ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
144
Voted
BIBM
2010
IEEE
156views Bioinformatics» more  BIBM 2010»
15 years 5 days ago
Truncation of protein sequences for fast profile alignment with application to subcellular localization
We have recently found that the computation time of homology-based subcellular localization can be substantially reduced by aligning profiles up to the cleavage site positions of s...
Man-Wai Mak, Wei Wang, Sun-Yuan Kung
BIBM
2010
IEEE
158views Bioinformatics» more  BIBM 2010»
15 years 5 days ago
Protein-protein interaction prediction via Collective Matrix Factorization
Abstract--Protein-protein interactions (PPI) play an important role in cellular processes and metabolic processes within a cell. An important task is to determine the existence of ...
Qian Xu, Evan Wei Xiang, Qiang Yang
« Prev « First page 2155 / 2199 Last » Next »