Sciweavers

2949 search results - page 590 / 590
» Transformations in Information Supply
Sort
View
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
12 years 25 days ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
STOC
2009
ACM
271views Algorithms» more  STOC 2009»
14 years 5 months ago
A fast and efficient algorithm for low-rank approximation of a matrix
The low-rank matrix approximation problem involves finding of a rank k version of a m ? n matrix AAA, labeled AAAk, such that AAAk is as "close" as possible to the best ...
Nam H. Nguyen, Thong T. Do, Trac D. Tran
WWW
2003
ACM
14 years 6 months ago
Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks
RDF-based P2P networks have a number of advantages compared with simpler P2P networks such as Napster, Gnutella or with approaches based on distributed indices such as CAN and CHO...
Alexander Löser, Christoph Schmitz, Ingo Brun...
BMCBI
2011
13 years 8 days ago
ASPDock: protein-protein docking algorithm using atomic solvation parameters model
Background: Atomic Solvation Parameters (ASP) model has been proven to be a very successful method of calculating the binding free energy of protein complexes. This suggests that ...
Lin Li, Dachuan Guo, Yangyu Huang, Shiyong Liu, Yi...