Sciweavers

587 search results - page 59 / 118
» Role updating for assignments
Sort
View
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
13 years 9 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
TSMC
1998
88views more  TSMC 1998»
13 years 8 months ago
Intelligent compliant motion control
—The role of a compliant motion scheme is to control a robot manipulator in contact with its environment. By accommodating with the interaction force, the manipulator can be used...
Omar M. Al-Jarrah, Yuan F. Zheng
NAR
2007
116views more  NAR 2007»
13 years 8 months ago
Protein knot server: detection of knots in protein structures
KNOTS (http://knots.mit.edu) is a web server that detects knots in protein structures. Several protein structures have been reported to contain intricate knots. The physiological ...
Grigory Kolesov, Peter Virnau, Mehran Kardar, Leon...
IJPP
2011
99views more  IJPP 2011»
13 years 3 months ago
Regular Lattice and Small-World Spin Model Simulations Using CUDA and GPUs
Data-parallel accelerator devices such as Graphical Processing Units (GPUs) are providing dramatic performance improvements over even multicore CPUs for lattice-oriented applicatio...
Kenneth A. Hawick, Arno Leist, Daniel P. Playne
ICIP
2001
IEEE
14 years 10 months ago
Similarity measure for CCITT Group 4 compressed document images
Similarity measure of document images acts a crucial role in the area of document image retrieval. A method of measuring the similarity of CCITT Group 4 compressed document images...
Yue Lu, Chew Lim Tan, Liying Fan, Weihua Huang