Sciweavers

519 search results - page 86 / 104
» Data Intensive Distributed Computing; A Medical Application ...
Sort
View
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 1 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
DEBU
2010
134views more  DEBU 2010»
14 years 6 months ago
Causality in Databases
Provenance is often used to validate data, by verifying its origin and explaining its derivation. When searching for "causes" of tuples in the query results or in genera...
Alexandra Meliou, Wolfgang Gatterbauer, Joseph Y. ...
RECOMB
2004
Springer
15 years 9 months ago
Mining protein family specific residue packing patterns from protein structure graphs
Finding recurring residue packing patterns, or spatial motifs, that characterize protein structural families is an important problem in bioinformatics. To this end, we apply a nov...
Jun Huan, Wei Wang 0010, Deepak Bandyopadhyay, Jac...
DILS
2004
Springer
15 years 2 months ago
PROVA: Rule-Based Java-Scripting for a Bioinformatics Semantic Web
Abstract. Transparent information integration across distributed and heterogeneous data sources and computational tools is a prime concern for bioinformatics. Recently, there have ...
Alexander Kozlenkov, Michael Schroeder
EUROPAR
2007
Springer
15 years 3 months ago
Decision Trees and MPI Collective Algorithm Selection Problem
Selecting the close-to-optimal collective algorithm based on the parameters of the collective call at run time is an important step for achieving good performance of MPI applicatio...
Jelena Pjesivac-Grbovic, George Bosilca, Graham E....