Sciweavers

700 search results - page 120 / 140
» et 2008
Sort
View
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
PODC
2009
ACM
14 years 8 months ago
Simple and efficient asynchronous byzantine agreement with optimal resilience
Consider a completely asynchronous network consisting of n parties where every two parties are connected by a private channel. An adversary At with unbounded computing power activ...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
SPEECH
2010
105views more  SPEECH 2010»
13 years 6 months ago
On the acoustic correlates of high and low nuclear pitch accents in American English
Earlier findings in Shue et al. (2007, 2008) raised questions about the alignment of nuclear pitch accents in American English, which are addressed here by eliciting both high an...
Yen-Liang Shue, Stefanie Shattuck-Hufnagel, Markus...
IMSCCS
2007
IEEE
14 years 1 months ago
Asymmetric Bagging and Feature Selection for Activities Prediction of Drug Molecules
Background: Activities of drug molecules can be predicted by QSAR (quantitative structure activity relationship) models, which overcomes the disadvantages of high cost and long cy...
Guo-Zheng Li, Hao-Hua Meng, Mary Qu Yang, Jack Y. ...
IMSCCS
2007
IEEE
14 years 1 months ago
Evolutionary Conservation of DNA-Contact residues in DNA-binding Domains
Background: DNA-binding proteins are of utmost importance to gene regulation. The identification of DNA-binding domains is useful for understanding the regulation mechanisms of DN...
Yao-Lin Chang, Huai-Kuang Tsai, Cheng-Yan Kao, Yun...