Sciweavers

473 search results - page 95 / 95
» The multiplicative power of consensus numbers
Sort
View
IACR
2011
125views more  IACR 2011»
12 years 5 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
SIGMOD
2012
ACM
190views Database» more  SIGMOD 2012»
11 years 8 months ago
Sample-driven schema mapping
End-users increasingly find the need to perform light-weight, customized schema mapping. State-of-the-art tools provide powerful functions to generate schema mappings, but they u...
Li Qian, Michael J. Cafarella, H. V. Jagadish
BMCBI
2007
144views more  BMCBI 2007»
13 years 5 months ago
InPrePPI: an integrated evaluation method based on genomic context for predicting protein-protein interactions in prokaryotic ge
Background: Although many genomic features have been used in the prediction of proteinprotein interactions (PPIs), frequently only one is used in a computational method. After rea...
Jingchun Sun, Yan Sun, Guohui Ding, Qi Liu, Chuan ...