Sciweavers

556 search results - page 42 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
BIBE
2007
IEEE
110views Bioinformatics» more  BIBE 2007»
15 years 8 months ago
Discrete Methods for Association Search and Status Prediction in Genotype Case-Control Studies
Abstract—Recent improvements in high-throughput genotyping technology make possible genome-wide association studies and status prediction (classification) for common complex dis...
Dumitru Brinza, Alexander Zelikovsky
136
Voted
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass
114
Voted
MM
2010
ACM
146views Multimedia» more  MM 2010»
15 years 2 months ago
Making computers look the way we look: exploiting visual attention for image understanding
Human Visual attention (HVA) is an important strategy to focus on specific information while observing and understanding visual stimuli. HVA involves making a series of fixations ...
Harish Katti, Subramanian Ramanathan, Mohan S. Kan...
91
Voted
ARC
2007
Springer
140views Hardware» more  ARC 2007»
15 years 5 months ago
Reconfigurable Computing for Accelerating Protein Folding Simulations
Abstract. This paper presents a methodology for the design of a reconfigurable computing system applied to a complex problem in molecular Biology: the protein folding problem. An e...
Nilton B. Armstrong, Heitor S. Lopes, Carlos R. Er...
FMSD
2008
94views more  FMSD 2008»
15 years 1 months ago
Optimal infinite scheduling for multi-priced timed automata
Abstract. This paper is concerned with the derivation of infinite schedules for timed automata that are in some sense optimal. To cover a wide class of optimality criteria we start...
Patricia Bouyer, Ed Brinksma, Kim Guldstrand Larse...