Sciweavers

2409 search results - page 154 / 482
» Building Components from Functions
Sort
View
114
Voted
AFRICACRYPT
2010
Springer
15 years 5 months ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...
DAC
1998
ACM
15 years 4 months ago
Synthesis of Power-Optimized and Area-Optimized Circuits from Hierarchical Behavioral Descriptions
We present a technique for synthesizing power- as well as area-optimized circuits from hierarchical data flow graphs under throughput constraints. We allow for the use of complex...
Ganesh Lakshminarayana, Niraj K. Jha
119
Voted
DCC
2010
IEEE
15 years 16 days ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
100
Voted
BMCBI
2007
114views more  BMCBI 2007»
15 years 14 days ago
Gene models from ESTs (GeneModelEST): an application on the Solanum lycopersicum genome
Background: The structure annotation of a genome is based either on ab initio methodologies or on similaritiy searches versus molecules that have been already annotated. Ab initio...
Nunzio D'Agostino, Alessandra Traini, Luigi Frusci...
147
Voted
ICDM
2009
IEEE
151views Data Mining» more  ICDM 2009»
14 years 10 months ago
TagLearner: A P2P Classifier Learning System from Collaboratively Tagged Text Documents
The amount of text data on the Internet is growing at a very fast rate. Online text repositories for news agencies, digital libraries and other organizations currently store gigaan...
Haimonti Dutta, Xianshu Zhu, Tushar Mahule, Hillol...