Sciweavers

780 search results - page 156 / 156
» Robustness and Randomness
Sort
View
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
CVPR
2012
IEEE
11 years 11 months ago
A learning based deformable template matching method for automatic rib centerline extraction and labeling in CT images
The automatic extraction and labeling of the rib centerlines is a useful yet challenging task in many clinical applications. In this paper, we propose a new approach integrating r...
Dijia Wu, David Liu, Zoltan Puskas, Chao Lu, Andre...
RECOMB
2012
Springer
11 years 11 months ago
Recovering the Tree-Like Trend of Evolution Despite Extensive Lateral Genetic Transfer: A Probabilistic Analysis
Abstract. Lateral gene transfer (LGT) is a common mechanism of nonvertical evolution where genetic material is transferred between two more or less distantly related organisms. It ...
Sebastien Roch, Sagi Snir
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 11 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
BIOINFORMATICS
2005
134views more  BIOINFORMATICS 2005»
13 years 8 months ago
Outcome signature genes in breast cancer: is there a unique set?
Motivation: direct bearing whose expres Sorlie et al., 2 gene sets is a diseases (Lossos et al., 2004; Miklos and Maleszka, 2004), and the variables that could account questions i...
Liat Ein-Dor, Itai Kela, Gad Getz, David Givol, Ey...