Sciweavers

556 search results - page 42 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
BIBE
2007
IEEE
110views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
Discrete Methods for Association Search and Status Prediction in Genotype Case-Control Studies
Abstract—Recent improvements in high-throughput genotyping technology make possible genome-wide association studies and status prediction (classification) for common complex dis...
Dumitru Brinza, Alexander Zelikovsky
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass
MM
2010
ACM
146views Multimedia» more  MM 2010»
14 years 12 months ago
Making computers look the way we look: exploiting visual attention for image understanding
Human Visual attention (HVA) is an important strategy to focus on specific information while observing and understanding visual stimuli. HVA involves making a series of fixations ...
Harish Katti, Subramanian Ramanathan, Mohan S. Kan...
79
Voted
ARC
2007
Springer
140views Hardware» more  ARC 2007»
15 years 3 months ago
Reconfigurable Computing for Accelerating Protein Folding Simulations
Abstract. This paper presents a methodology for the design of a reconfigurable computing system applied to a complex problem in molecular Biology: the protein folding problem. An e...
Nilton B. Armstrong, Heitor S. Lopes, Carlos R. Er...
FMSD
2008
94views more  FMSD 2008»
14 years 11 months ago
Optimal infinite scheduling for multi-priced timed automata
Abstract. This paper is concerned with the derivation of infinite schedules for timed automata that are in some sense optimal. To cover a wide class of optimality criteria we start...
Patricia Bouyer, Ed Brinksma, Kim Guldstrand Larse...