Sciweavers

1237 search results - page 245 / 248
» Strictness and Totality Analysis
Sort
View
IJNSEC
2011
145views more  IJNSEC 2011»
13 years 1 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
KAIS
2011
129views more  KAIS 2011»
13 years 1 months ago
Counting triangles in real-world networks using projections
Triangle counting is an important problem in graph mining. Two frequently used metrics in complex network analysis which require the count of triangles are the clustering coefficie...
Charalampos E. Tsourakakis
WWW
2011
ACM
13 years 1 months ago
Consideration set generation in commerce search
In commerce search, the set of products returned by a search engine often forms the basis for all user interactions leading up to a potential transaction on the web. Such a set of...
Sayan Bhattacharya, Sreenivas Gollapudi, Kamesh Mu...
NAR
2010
165views more  NAR 2010»
13 years 1 months ago
PhosPhAt: the Arabidopsis thaliana phosphorylation site database. An update
: Growth and development of plants depends on uptake and assimilation of nutrients. Many assimilation products of macronutrients are not only essential for plant growth but also ha...
Pawel Durek, Robert Schmidt, Joshua L. Heazlewood,...
BMCBI
2011
12 years 10 months ago
PRIN, a predicted rice interactome network
Background: Protein-protein interactions play a fundamental role in elucidating the molecular mechanisms of biomolecular function, signal transductions and metabolic pathways of l...
Haibin Gu, Pengcheng Zhu, Yinming Jiao, Yijun Meng...