Sciweavers

6104 search results - page 972 / 1221
» Constructing Information Bases Using Associative Structures
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 4 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
166
Voted
BMCBI
2010
126views more  BMCBI 2010»
15 years 1 months ago
Systematic integration of experimental data and models in systems biology
Background: The behaviour of biological systems can be deduced from their mathematical models. However, multiple sources of data in diverse forms are required in the construction ...
Peter Li, Joseph O. Dada, Daniel Jameson, Irena Sp...
EUROCRYPT
2001
Springer
15 years 8 months ago
Cryptographic Counters and Applications to Electronic Voting
We formalize the notion of a cryptographic counter, which allows a group of participants to increment and decrement a cryptographic representation of a (hidden) numerical value pri...
Jonathan Katz, Steven Myers, Rafail Ostrovsky
129
Voted
IPPS
2007
IEEE
15 years 10 months ago
Software Tools for Performance Modeling of Parallel Programs
This paper presents a framework based on a user driven methodology to obtain analytical models of MPI applications on parallel systems in a systematic and easy to use way. This me...
Diego Rodriguez Martínez, Vicente Blanco P&...
CIKM
2010
Springer
15 years 2 months ago
A probabilistic topic-connection model for automatic image annotation
The explosive increase of image data on Internet has made it an important, yet very challenging task to index and automatically annotate image data. To achieve that end, sophistic...
Xin Chen, Xiaohua Hu, Zhongna Zhou, Caimei Lu, Gai...