Sciweavers

43264 search results - page 8495 / 8653
» Comparing models of computation
Sort
View
DCC
2010
IEEE
15 years 3 months ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
ALMOB
2006
138views more  ALMOB 2006»
15 years 3 months ago
A combinatorial optimization approach for diverse motif finding applications
Background: Discovering approximately repeated patterns, or motifs, in biological sequences is an important and widely-studied problem in computational molecular biology. Most fre...
Elena Zaslavsky, Mona Singh
APIN
2006
90views more  APIN 2006»
15 years 3 months ago
AgentTeamwork: Coordinating grid-computing jobs with mobile agents
AgentTeamwork is a grid-computing middleware system that dispatches a collection of mobile agents to coordinate a user job over remote computing nodes in a decentralized manner. I...
Munehiro Fukuda, Koichi Kashiwagi, Shin-ya Kobayas...
BMCBI
2006
137views more  BMCBI 2006»
15 years 3 months ago
Curation of complex, context-dependent immunological data
Background: The Immune Epitope Database and Analysis Resource (IEDB) is dedicated to capturing, housing and analyzing complex immune epitope related data http:// www.immuneepitope...
Randi Vita, Kerrie Vaughan, Laura Zarebski, Nima S...
CORR
2006
Springer
81views Education» more  CORR 2006»
15 years 3 months ago
The Workshop on Internet Topology (WIT) Report
Internet topology analysis has recently experienced a surge of interest in computer science, physics, and the mathematical sciences. However, researchers from these different disc...
Dmitri V. Krioukov, Fan R. K. Chung, Kimberly C. C...
« Prev « First page 8495 / 8653 Last » Next »