Sciweavers

5722 search results - page 112 / 1145
» Security Function Interactions
Sort
View
CORR
2010
Springer
86views Education» more  CORR 2010»
13 years 7 months ago
Secure Multiparty Computation with Partial Fairness
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a truste...
Amos Beimel, Eran Omri, Ilan Orlov
SIGGRAPH
1997
ACM
14 years 1 months ago
Guaranteeing the topology of an implicit surface polygonization for interactive modeling
Morse theory shows how the topology of an implicit surface is affected by its function’s critical points, whereas catastrophe theory shows how these critical points behave as th...
Barton T. Stander, John C. Hart
LREC
2010
138views Education» more  LREC 2010»
13 years 10 months ago
FOLKER: An Annotation Tool for Efficient Transcription of Natural, Multi-party Interaction
This paper presents FOLKER, an annotation tool developed for the efficient transcription of natural, multi-party interaction in a conversation analysis framework. FOLKER is being ...
Thomas Schmidt, Wilfried Schütte
CSCWD
2009
Springer
14 years 5 days ago
Privacy preserving on Radio Frequency Identification systems
This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems. RFID systems have already widely applied in industry and have been bringing l...
Hua Wang, Lili Sun, Jianming Yong, Yongbing Zhang
BMCBI
2010
160views more  BMCBI 2010»
13 years 9 months ago
Identification of functional hubs and modules by converting interactome networks into hierarchical ordering of proteins
Background: Protein-protein interactions play a key role in biological processes of proteins within a cell. Recent high-throughput techniques have generated protein-protein intera...
Young-Rae Cho, Aidong Zhang