Sciweavers

674 search results - page 51 / 135
» From Constructibility and Absoluteness to Computability and ...
Sort
View
JCP
2008
121views more  JCP 2008»
15 years 1 months ago
Towards Design Space Exploration for Biological Systems
For both embedded systems and biological cell systems, design is a feature that defines their identity. The assembly of different components in designs of both systems can vary wid...
Simon Polstra, Tessa E. Pronk, Andy D. Pimentel, T...
CORR
2010
Springer
65views Education» more  CORR 2010»
15 years 2 months ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar
BMCBI
2008
114views more  BMCBI 2008»
15 years 2 months ago
Identifying a few foot-and-mouth disease virus signature nucleotide strings for computational genotyping
Background: Serotypes of the Foot-and-Mouth disease viruses (FMDVs) were generally determined by biological experiments. The computational genotyping is not well studied even with...
Guohui Lin, Zhipeng Cai, Junfeng Wu, Xiu-Feng Wan,...
DLOG
2010
14 years 12 months ago
Automata-Based Abduction for Tractable Diagnosis
Abstract. Abductive reasoning has been recognized as a valuable complement to deductive inference for tasks such as diagnosis and integration of incomplete information despite its ...
Thomas Hubauer, Steffen Lamparter, Michael Pirker
ASIACRYPT
2011
Springer
14 years 1 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust