Sciweavers

504 search results - page 96 / 101
» The Consistency of the CADIAG-2 Knowledge Base: A Probabilis...
Sort
View
IACR
2011
97views more  IACR 2011»
12 years 7 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
13 years 7 months ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
ICDE
2001
IEEE
106views Database» more  ICDE 2001»
14 years 9 months ago
Querying XML Documents Made Easy: Nearest Concept Queries
Due to the ubiquity and popularity of XML, users often are in the following situation: they want to query XML documents which contain potentially interesting information but they ...
Albrecht Schmidt 0002, Martin L. Kersten, Menzo Wi...
ICASSP
2007
IEEE
14 years 1 months ago
A Multi-Subject, Dynamic Bayesian Networks (DBNS) Framework for Brain Effective Connectivity
As dynamic connectivity is shown essential for normal brain function and is disrupted in disease, it is critical to develop models for inferring brain effective connectivity from ...
Junning Li, Z. Jane Wang, Martin J. McKeown
GECCO
2007
Springer
211views Optimization» more  GECCO 2007»
14 years 1 months ago
An extremal optimization search method for the protein folding problem: the go-model example
The protein folding problem consists of predicting the functional (native) structure of the protein given its linear sequence of amino acids. Despite extensive progress made in un...
Alena Shmygelska