Sciweavers

1712 search results - page 81 / 343
» A Computational Approach to Binding Theory
Sort
View
ISMVL
2000
IEEE
105views Hardware» more  ISMVL 2000»
15 years 4 months ago
Computational Neurobiology Meets Semiconductor Engineering
Many believe that the most important result to come out of the last ten years of neural network research is the significant change in perspective in the neuroscience community tow...
Dan W. Hammerstrom
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
RECOMB
2008
Springer
16 years 6 days ago
On Computing the Breakpoint Reuse Rate in Rearrangement Scenarios
In the past years, many combinatorial arguments have been made to support the theory that mammalian genome rearrangement scenarios rely heavily on breakpoint reuse. Different model...
Anne Bergeron, Julia Mixtacki, Jens Stoye
ESCIENCE
2006
IEEE
15 years 3 months ago
Toward Standards for Integration of Instruments into Grid Computing Environments
Instruments and sensors are the primary sources of data driving science and the development and refinement of theory. A critical component of eresearch yet to be clarified is the ...
Donald F. McMullen, Ian M. Atkinson, Kenneth Chiu,...
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 29 days ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...