Sciweavers

4343 search results - page 5 / 869
» Segmentation from a Box
Sort
View
MIDDLEWARE
2004
Springer
14 years 1 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...
COCO
2006
Springer
75views Algorithms» more  COCO 2006»
14 years 9 days ago
Distinguishing SAT from Polynomial-Size Circuits, through Black-Box Queries
We may believe SAT does not have small Boolean circuits. But is it possible that some language with small circuits looks indistiguishable from SAT to every polynomialtime bounded ...
Albert Atserias
ASIACRYPT
2009
Springer
14 years 3 months ago
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
Abstract. Predicate encryption is a recent generalization of identitybased encryption (IBE), broadcast encryption, attribute-based encryption, and more. A natural question is wheth...
Jonathan Katz, Arkady Yerukhimovich
BIB
2008
141views more  BIB 2008»
13 years 8 months ago
Detecting short tandem repeats from genome data: opening the software black box
Short tandem repeats, specifically microsatellites, are widely used genetic markers, associated with human genetic diseases, and play an important role in various regulatory mecha...
Angelika Merkel, Neil Gemmell
IFSA
2007
Springer
149views Fuzzy Logic» more  IFSA 2007»
14 years 2 months ago
From Interval Computations to Constraint-Related Set Computations: Towards Faster Estimation of Statistics and ODEs Under Interv
One of the important components of granular computing is interval computations. In interval computations, at each intermediate stage of the computation, we have intervals of possi...
Martine Ceberio, Vladik Kreinovich, Andrzej Pownuk...