Sciweavers

3996 search results - page 775 / 800
» A Publish
Sort
View
LATINCRYPT
2010
14 years 10 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
NECO
2010
154views more  NECO 2010»
14 years 10 months ago
Role of Homeostasis in Learning Sparse Representations
Neurons in the input layer of primary visual cortex in primates develop edge-like receptive fields. One approach to understanding the emergence of this response is to state that ...
Laurent U. Perrinet
PVLDB
2010
118views more  PVLDB 2010»
14 years 10 months ago
Global Detection of Complex Copying Relationships Between Sources
Web technologies have enabled data sharing between sources but also simplified copying (and often publishing without proper attribution). The copying relationships can be complex...
Xin Dong, Laure Berti-Equille, Yifan Hu, Divesh Sr...
SCHOLARPEDIA
2010
80views more  SCHOLARPEDIA 2010»
14 years 10 months ago
Working memory
—Studies of attention and working memory address the fundamental limits in our ability to encode and maintain behaviorally relevant information, processes that are critical for g...
Alan Baddeley
TCBB
2010
136views more  TCBB 2010»
14 years 10 months ago
Efficient Extraction of Protein-Protein Interactions from Full-Text Articles
—Proteins and their interactions govern virtually all cellular processes, such as regulation, signaling, metabolism, and structure. Most experimental findings pertaining to such ...
Jörg Hakenberg, Robert Leaman, Nguyen Ha Vo, ...