Sciweavers

511 search results - page 102 / 103
» A Methodology for Extending Focusing Frameworks
Sort
View
PKC
2007
Springer
124views Cryptology» more  PKC 2007»
15 years 3 months ago
Practical and Secure Solutions for Integer Comparison
Abstract. Yao’s classical millionaires’ problem is about securely determining whether x > y, given two input values x, y, which are held as private inputs by two parties, re...
Juan A. Garay, Berry Schoenmakers, José Vil...
92
Voted
EVOW
2005
Springer
15 years 3 months ago
Order Preserving Clustering over Multiple Time Course Experiments
Abstract. Clustering still represents the most commonly used technique to analyze gene expression data—be it classical clustering approaches that aim at finding biologically rel...
Stefan Bleuler, Eckart Zitzler
CIT
2004
Springer
15 years 3 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
CA
2003
IEEE
15 years 2 months ago
Language-Driven Nonverbal Communication in a Bilingual Conversational Agent
This paper describes an animated conversational agent called Kare1 which integrates a talking head interface with a linguistically motivated human-machine dialogue system. The age...
Scott A. King, Alistair Knott, Brendan McCane
VLDB
1993
ACM
97views Database» more  VLDB 1993»
15 years 1 months ago
Managing Derived Data in the Gaea Scientific DBMS
ract One important aspect of scientific data management is metadata management. Metadata is information about data (e.g., content, source, processing applied, precision). One kind ...
Nabil I. Hachem, Ke Qiu, Michael A. Gennert, Matth...