Sciweavers

1006 search results - page 103 / 202
» What is this page known for
Sort
View
NAR
2000
128views more  NAR 2000»
13 years 8 months ago
The IMB Jena Image Library of Biological Macromolecules
The IMB Jena Image Library of Biological Macromolecules (http://www.imb-jena.de/IMAGE.html ) is aimed at a better dissemination of information on three-dimensional biopolymer stru...
Jan Reichert, Andreas Jabs, Peter Slickers, Jü...
SAC
2010
ACM
13 years 7 months ago
Host-IP clustering technique for deep web characterization
—A huge portion of todays Web consists of web pages filled with information from myriads of online databases. This part of the Web, known as the deep Web, is to date relatively ...
Denis Shestakov, Tapio Salakoski
STOC
2012
ACM
193views Algorithms» more  STOC 2012»
11 years 11 months ago
A new point of NP-hardness for unique games
d abstract; full version begins on page 13) Ryan O’Donnell∗ John Wright† November 2, 2011 We show that distinguishing 1 2 -satisfiable Unique-Games instances from (3 8 + )-...
Ryan O'Donnell, John Wright
ICCV
1999
IEEE
14 years 10 months ago
Vision in Bad Weather
Current vision systems are designed to perform in clear weather. Needless to say, in any outdoor application, there is no escape from "bad" weather. Ultimately, computer...
Shree K. Nayar, Srinivasa G. Narasimhan
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 9 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim