Sciweavers

43264 search results - page 8495 / 8653
» Comparing models of computation
Sort
View
DCC
2010
IEEE
14 years 10 months ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
ALMOB
2006
138views more  ALMOB 2006»
14 years 10 months ago
A combinatorial optimization approach for diverse motif finding applications
Background: Discovering approximately repeated patterns, or motifs, in biological sequences is an important and widely-studied problem in computational molecular biology. Most fre...
Elena Zaslavsky, Mona Singh
APIN
2006
90views more  APIN 2006»
14 years 10 months ago
AgentTeamwork: Coordinating grid-computing jobs with mobile agents
AgentTeamwork is a grid-computing middleware system that dispatches a collection of mobile agents to coordinate a user job over remote computing nodes in a decentralized manner. I...
Munehiro Fukuda, Koichi Kashiwagi, Shin-ya Kobayas...
81
Voted
BMCBI
2006
137views more  BMCBI 2006»
14 years 10 months ago
Curation of complex, context-dependent immunological data
Background: The Immune Epitope Database and Analysis Resource (IEDB) is dedicated to capturing, housing and analyzing complex immune epitope related data http:// www.immuneepitope...
Randi Vita, Kerrie Vaughan, Laura Zarebski, Nima S...
CORR
2006
Springer
81views Education» more  CORR 2006»
14 years 10 months ago
The Workshop on Internet Topology (WIT) Report
Internet topology analysis has recently experienced a surge of interest in computer science, physics, and the mathematical sciences. However, researchers from these different disc...
Dmitri V. Krioukov, Fan R. K. Chung, Kimberly C. C...
« Prev « First page 8495 / 8653 Last » Next »