Sciweavers

2447 search results - page 385 / 490
» Chemical Similarity Searching
Sort
View
CCS
2003
ACM
15 years 7 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
FCT
2003
Springer
15 years 7 months ago
An Extended Quadratic Frobenius Primality Test with Average and Worst Case Error Estimates
We present an Extended Quadratic Frobenius Primality Test (EQFT), which is related to the Miller-Rabin test and to several other known probabilistic tests. EQFT takes time equival...
Ivan Damgård, Gudmund Skovbjerg Frandsen
CHI
2010
ACM
15 years 6 months ago
Cultural difference in image tagging
Do people from different cultures tag digital images differently? The current study compared the content of tags for digital images created by two cultural groups: European Americ...
Wei Dong, Wai-Tat Fu
HPDC
2002
IEEE
15 years 6 months ago
A Decentralized, Adaptive Replica Location Mechanism
We describe a decentralized, adaptive mechanism for replica location in wide-area distributed systems. Unlike traditional, hierarchical (e.g, DNS) and more recent (e.g., CAN, Chor...
Matei Ripeanu, Ian T. Foster
CPAIOR
2010
Springer
15 years 6 months ago
A Constraint Integer Programming Approach for Resource-Constrained Project Scheduling
Abstract. We propose a hybrid approach for solving the resource-constrained project scheduling problem which is an extremely hard to solve combinatorial optimization problem of pra...
Timo Berthold, Stefan Heinz, Marco E. Lübbeck...