Sciweavers

9 search results - page 2 / 2
» Swiftly Computing Center Strings
Sort
View
FOCS
2004
IEEE
13 years 9 months ago
Universally Composable Protocols with Relaxed Set-Up Assumptions
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) protocols provide th...
Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafa...
CEC
2007
IEEE
13 years 11 months ago
MRI brain image segmentation by fuzzy symmetry based genetic clustering technique
—In this paper, an automatic segmentation technique of multispectral magnetic resonance image of the brain using a new fuzzy point symmetry based genetic clustering technique is ...
Sriparna Saha, Sanghamitra Bandyopadhyay
WPES
2003
ACM
13 years 10 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...
BMCBI
2004
208views more  BMCBI 2004»
13 years 5 months ago
Using 3D Hidden Markov Models that explicitly represent spatial coordinates to model and compare protein structures
Background: Hidden Markov Models (HMMs) have proven very useful in computational biology for such applications as sequence pattern matching, gene-finding, and structure prediction...
Vadim Alexandrov, Mark Gerstein