Sciweavers

556 search results - page 42 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
129
Voted
BIBE
2007
IEEE
110views Bioinformatics» more  BIBE 2007»
15 years 10 months ago
Discrete Methods for Association Search and Status Prediction in Genotype Case-Control Studies
Abstract—Recent improvements in high-throughput genotyping technology make possible genome-wide association studies and status prediction (classification) for common complex dis...
Dumitru Brinza, Alexander Zelikovsky
151
Voted
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass
132
Voted
MM
2010
ACM
146views Multimedia» more  MM 2010»
15 years 3 months ago
Making computers look the way we look: exploiting visual attention for image understanding
Human Visual attention (HVA) is an important strategy to focus on specific information while observing and understanding visual stimuli. HVA involves making a series of fixations ...
Harish Katti, Subramanian Ramanathan, Mohan S. Kan...
108
Voted
ARC
2007
Springer
140views Hardware» more  ARC 2007»
15 years 7 months ago
Reconfigurable Computing for Accelerating Protein Folding Simulations
Abstract. This paper presents a methodology for the design of a reconfigurable computing system applied to a complex problem in molecular Biology: the protein folding problem. An e...
Nilton B. Armstrong, Heitor S. Lopes, Carlos R. Er...
129
Voted
FMSD
2008
94views more  FMSD 2008»
15 years 3 months ago
Optimal infinite scheduling for multi-priced timed automata
Abstract. This paper is concerned with the derivation of infinite schedules for timed automata that are in some sense optimal. To cover a wide class of optimality criteria we start...
Patricia Bouyer, Ed Brinksma, Kim Guldstrand Larse...