Sciweavers

1834 search results - page 338 / 367
» Public Key Cryptography
Sort
View
BMCBI
2005
131views more  BMCBI 2005»
13 years 7 months ago
Critical evaluation of the JDO API for the persistence and portability requirements of complex biological databases
Background: Complex biological database systems have become key computational tools used daily by scientists and researchers. Many of these systems must be capable of executing on...
Marko Srdanovic, Ulf Schenk, Michael Schwieger, Fa...
VLDB
2002
ACM
116views Database» more  VLDB 2002»
13 years 7 months ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan
MT
2007
158views more  MT 2007»
13 years 7 months ago
Automatic extraction of translations from web-based bilingual materials
This paper describes the framework of the StatCan Daily Translation Extraction System (SDTES), a computer system that maps and compares webbased translation texts of Statistics Can...
Qibo Zhu, Diana Zaiu Inkpen, Ash Asudeh
NAR
2008
122views more  NAR 2008»
13 years 7 months ago
PlantTFDB: a comprehensive plant transcription factor database
Transcription factors (TFs) play key roles in controlling gene expression. Systematic identification and annotation of TFs, followed by construction of TF databases may serve as u...
Anyuan Guo, Xin Chen, Ge Gao, He Zhang, Qihui Zhu,...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart