Sciweavers

369 search results - page 73 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
EUROCRYPT
2003
Springer
13 years 11 months ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski
EDBTW
2010
Springer
13 years 10 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
SCIA
2009
Springer
305views Image Analysis» more  SCIA 2009»
14 years 5 days ago
A Convex Approach to Low Rank Matrix Approximation with Missing Data
Many computer vision problems can be formulated as low rank bilinear minimization problems. One reason for the success of these problems is that they can be efficiently solved usin...
Carl Olsson, Magnus Oskarsson
JCP
2007
121views more  JCP 2007»
13 years 5 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
BMCBI
2008
97views more  BMCBI 2008»
13 years 5 months ago
Comparison study on k-word statistical measures for protein: From sequence to 'sequence space'
Background: Many proposed statistical measures can efficiently compare protein sequence to further infer protein structure, function and evolutionary information. They share the s...
Qi Dai, Tian-Ming Wang