Sciweavers

3690 search results - page 296 / 738
» Computation with classical sequents
Sort
View
FOCS
2005
IEEE
15 years 11 months ago
Cryptography In the Bounded Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary’s quantum memory is of bounded size. We show that oblivious ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
154
Voted
ICPADS
2005
IEEE
15 years 11 months ago
Exploiting Multi-level Parallelism for Homology Search using General Purpose Processors
New biological experimental techniques are continuing to generate large amounts of data using DNA, RNA, human genome and protein sequences. The quantity and quality of data from t...
Xiandong Meng, Vipin Chaudhary
IPPS
2005
IEEE
15 years 11 months ago
A Maintenance-Oriented Fault Model for the DECOS Integrated Diagnostic Architecture
Abstract— The increasing use of electronics in the automotive and avionic domain has lead to dramatic improvements with respect to functionality, safety, and cost. However, with ...
Philipp Peti, Roman Obermaisser, Astrit Ademaj, He...
AUSAI
2005
Springer
15 years 11 months ago
Ensemble Selection for SuperParent-One-Dependence Estimators
SuperParent-One-Dependence Estimators (SPODEs) loosen Naive-Bayes’ attribute independence assumption by allowing each attribute to depend on a common single attribute (superpare...
Ying Yang, Kevin B. Korb, Kai Ming Ting, Geoffrey ...
PAKDD
2005
ACM
134views Data Mining» more  PAKDD 2005»
15 years 11 months ago
Improved Bayesian Spam Filtering Based on Co-weighted Multi-area Information
Abstract. Bayesian spam filters, in general, compute probability estimations for tokens either without considering the email areas of occurrences except the body or treating the s...
Raju Shrestha, Yaping Lin