Sciweavers

175 search results - page 35 / 35
» A Directed Signature Scheme Based on RSA Assumption
Sort
View
TCC
2009
Springer
142views Cryptology» more  TCC 2009»
14 years 6 months ago
Chosen-Ciphertext Security via Correlated Products
We initiate the study of one-wayness under correlated products. We are interested in identifying necessary and sufficient conditions for a function f and a distribution on inputs ...
Alon Rosen, Gil Segev
ECCV
2002
Springer
14 years 7 months ago
What Can Be Known about the Radiometric Response from Images?
Abstract. Brightness values of pixels in an image are related to image irradiance by a non-linear function, called the radiometric response function. Recovery of this function is i...
Michael D. Grossberg, Shree K. Nayar
CCGRID
2005
IEEE
13 years 11 months ago
Mapping DAG-based applications to multiclusters with background workload
Before an application modelled as a Directed Acyclic Graph (DAG) is executed on a heterogeneous system, a DAG mapping policy is often enacted. After mapping, the tasks (in the DAG...
Ligang He, Stephen A. Jarvis, Daniel P. Spooner, D...
BMCBI
2007
114views more  BMCBI 2007»
13 years 5 months ago
Large scale statistical inference of signaling pathways from RNAi and microarray data
Background: The advent of RNA interference techniques enables the selective silencing of biologically interesting genes in an efficient way. In combination with DNA microarray tec...
Holger Fröhlich, Mark Fellmann, Holger Sü...
ML
2008
ACM
248views Machine Learning» more  ML 2008»
13 years 5 months ago
Feature selection via sensitivity analysis of SVM probabilistic outputs
Feature selection is an important aspect of solving data-mining and machine-learning problems. This paper proposes a feature-selection method for the Support Vector Machine (SVM) l...
Kai Quan Shen, Chong Jin Ong, Xiao Ping Li, Einar ...