Sciweavers

1215 search results - page 178 / 243
» Testing in the Distributed Test Architecture: An Extended Ab...
Sort
View
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
14 years 15 days ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
ATAL
2008
Springer
13 years 10 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...
BIOCOMP
2008
13 years 10 months ago
Analysis of Protein-Ligand Interactions Using Localized Stereochemical Features
Computational analyses of protein structure-function relationships have traditionally been based on sequence homology, fold family analysis and 3D motifs/templates. Previous struct...
Reetal Pai, James C. Sacchettini, Thomas R. Ioerge...
IMAGING
2004
13 years 10 months ago
Modeling Dot Gain and Inks Interaction
Multispectral printer characterization requires an effective model to map printer input digital counts into reflectance spectra and vice versa. This paper presents a novel strateg...
Silvia Zuffi, Raimondo Schettini
AIPS
2000
13 years 10 months ago
Planning with Incomplete Information as Heuristic Search in Belief Space
The formulation of planning as heuristic search with heuristics derived from problem representations has turned out to be a fruitful approach for classical planning. In this paper...
Blai Bonet, Hector Geffner