Sciweavers

3381 search results - page 668 / 677
» Extending Dependencies with Conditions
Sort
View
JOC
2006
69views more  JOC 2006»
14 years 9 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
INTERNET
2007
113views more  INTERNET 2007»
14 years 9 months ago
REST Eye for the SOA Guy
it’s hardly Earth-shattering: abstracting your business services and separating them from your applications can yield an overall system that’s easier to build, maintain, and ex...
Steve Vinoski
TIP
2008
153views more  TIP 2008»
14 years 9 months ago
Generalized Flooding and Multicue PDE-Based Image Segmentation
Image segmentation remains an important, but hard-to-solve, problem since it appears to be application dependent with usually no a priori information available regarding the image ...
Anastasia Sofou, Petros Maragos
BMCBI
2005
86views more  BMCBI 2005»
14 years 9 months ago
Confirmation of human protein interaction data by human expression data
Background: With microarray technology the expression of thousands of genes can be measured simultaneously. It is well known that the expression levels of genes of interacting pro...
Andreas Hahn, Jörg Rahnenführer, Priti T...