Sciweavers

9382 search results - page 1753 / 1877
» A Functional Model for Data Analysis
Sort
View
CCS
2010
ACM
15 years 1 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
IJMMS
2011
104views more  IJMMS 2011»
14 years 11 months ago
Revisiting path steering for 3D manipulation tasks
The law of path steering, as proposed by Accot and Zhai, describes a quantitative relationship between human temporal performance and the path’s spatial characteristics. The ste...
Lei Liu, Jean-Bernard Martens, Robert van Liere
BMCBI
2011
14 years 8 months ago
In-silico prediction of disorder content using hybrid sequence representation
Background: Intrinsically disordered proteins play important roles in various cellular activities and their prevalence was implicated in a number of human diseases. The knowledge ...
Marcin J. Mizianty, Tuo Zhang, Bin Xue, Yaoqi Zhou...
CHI
2011
ACM
14 years 8 months ago
Enhancing credibility judgment of web search results
In this paper, we propose a system for helping users to judge the credibility of Web search results and to search for credible Web pages. Conventional Web search engines present o...
Yusuke Yamamoto, Katsumi Tanaka
POPL
2012
ACM
13 years 12 months ago
Playing in the grey area of proofs
Interpolation is an important technique in verification and static analysis of programs. In particular, interpolants extracted from proofs of various properties are used in invar...
Krystof Hoder, Laura Kovács, Andrei Voronko...
« Prev « First page 1753 / 1877 Last » Next »