Sciweavers

908 search results - page 173 / 182
» Additional methods when using email for teaching
Sort
View
P2P
2008
IEEE
15 years 4 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...
IBPRIA
2007
Springer
15 years 3 months ago
On the Detection of Regions-of-Interest in Dynamic Contrast-Enhanced MRI
Multivariate imaging technologies such as Dynamic Contrast-Enhanced Magnetic Resonance Imaging (DCE-MRI) have recently gained an important attention as it improves tumour detection...
David Raba, Marta Peracaula, Robert Marti, Joan Ma...
VMCAI
2007
Springer
15 years 3 months ago
Lattice Automata
Abstract. Several verification methods involve reasoning about multi-valued systems, in which an atomic proposition is interpreted at a state as a lattice element, rather than a B...
Orna Kupferman, Yoad Lustig
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
124
Voted
CIKM
2005
Springer
15 years 3 months ago
Semantic similarity over the gene ontology: family correlation and selecting disjunctive ancestors
Many bioinformatics applications would benefit from comparing proteins based on their biological role rather than their sequence. In most biological databases, proteins are alrea...
Francisco M. Couto, Mário J. Silva, Pedro C...