Sciweavers

1628 search results - page 232 / 326
» Compiler Construction Using Scheme
Sort
View
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 2 months ago
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
Abstract--We investigate the problem of maintaining an encoded distributed storage system when some nodes contain adversarial errors. Using the error-correction capabilities that a...
Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tr...
BIOINFORMATICS
2005
140views more  BIOINFORMATICS 2005»
15 years 2 months ago
Profile-based direct kernels for remote homology detection and fold recognition
Motivation: Remote homology detection between protein sequences is a central problem in computational biology. Supervised learning algorithms based on support vector machines are ...
Huzefa Rangwala, George Karypis
CORR
2004
Springer
107views Education» more  CORR 2004»
15 years 2 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
IJON
2002
154views more  IJON 2002»
15 years 2 months ago
Nonlinear model predictive control of a cutting process
Nonlinear model predictive control (MPC) of a simulated chaotic cutting process is presented. The nonlinear MPC combines a neural-network model and a genetic-algorithm-based optim...
Primoz Potocnik, Igor Grabec
IEEECIT
2010
IEEE
15 years 7 days ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu