Sciweavers

3804 search results - page 53 / 761
» From Here to There
Sort
View
CCS
2008
ACM
15 years 3 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
106
Voted
BIOINFORMATICS
2010
170views more  BIOINFORMATICS 2010»
15 years 1 months ago
Joint estimation of DNA copy number from multiple platforms
DNA copy number variants (CNV) are gains and losses of segments of chromosomes, and comprise an important class of genetic variation. Recently, various microarray hybridization ba...
Nancy R. Zhang, Yasin Senbabaoglu, Jun Z. Li
COMSWARE
2008
IEEE
15 years 2 months ago
Extracting dense communities from telecom call graphs
Social networks refer to structures made of nodes that represent people or other entities embedded in a social context, and whose edges represent interaction between entities. Typi...
Vinayaka Pandit, Natwar Modani, Sougata Mukherjea,...
199
Voted
CVPR
2003
IEEE
16 years 3 months ago
Learning epipolar geometry from image sequences
We wish to determine the epipolar geometry of a stereo camera pair from image measurements alone. This paper describes a solution to this problem which does not require a parametr...
Yonatan Wexler, Andrew W. Fitzgibbon, Andrew Zisse...
117
Voted
JCC
2011
87views more  JCC 2011»
14 years 8 months ago
Determining equilibrium constants for dimerization reactions from molecular dynamics simulations
Abstract: With today’s available computer power, free energy calculations from equilibrium molecular dynamics simulations “via counting” become feasible for an increasing num...
Djurre H. De Jong, Lars V. Schäfer, Alex H. D...