Sciweavers

3630 search results - page 516 / 726
» Fast Marching Methods
Sort
View
CRYPTO
2003
Springer
137views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
New Partial Key Exposure Attacks on RSA
Abstract. In 1998, Boneh, Durfee and Frankel [4] presented several attacks on RSA when an adversary knows a fraction of the secret key bits. The motivation for these so-called part...
Johannes Blömer, Alexander May
SIGGRAPH
1999
ACM
15 years 8 months ago
Realistic, Hardware-Accelerated Shading and Lighting
With fast 3D graphics becoming more and more available even on low end platforms, the focus in hardware-accelerated rendering is beginning to shift towards higher quality renderin...
Wolfgang Heidrich, Hans-Peter Seidel
FAST
2010
15 years 6 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
ALMOB
2008
82views more  ALMOB 2008»
15 years 4 months ago
Protein sequence and structure alignments within one framework
Background: Protein structure alignments are usually based on very different techniques to sequence alignments. We propose a method which treats sequence, structure and even combi...
Gundolf Schenk, Thomas Margraf, Andrew E. Torda
BMCBI
2010
113views more  BMCBI 2010»
15 years 4 months ago
ProbABEL package for genome-wide association analysis of imputed data
Background: Over the last few years, genome-wide association (GWA) studies became a tool of choice for the identification of loci associated with complex traits. Currently, impute...
Yurii S. Aulchenko, Maksim V. Struchalin, Cornelia...