Sciweavers

6274 search results - page 182 / 1255
» From query complexity to computational complexity
Sort
View
EUROCRYPT
2010
Springer
15 years 9 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
BMCBI
2004
151views more  BMCBI 2004»
15 years 4 months ago
A computational approach for ordering signal transduction pathway components from genomics and proteomics Data
Background: Signal transduction is one of the most important biological processes by which cells convert an external signal into a response. Novel computational approaches to mapp...
Yin Liu, Hongyu Zhao
JCB
2008
91views more  JCB 2008»
15 years 4 months ago
Computational Quantification of Peptides from LC-MS Data
Liquid chromatography coupled to mass spectrometry (LC-MS) has become a major tool for the study of biological processes. High-throughput LC-MS experiments are frequently conducte...
Ole Schulz-Trieglaff, Rene Hussong, Clemens Gr&oum...
EUROCRYPT
2000
Springer
15 years 8 months ago
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
Ronald Cramer, Ivan Damgård, Ueli M. Maurer
BMCBI
2010
118views more  BMCBI 2010»
15 years 4 months ago
Computing H/D-Exchange rates of single residues from data of proteolytic fragments
Background: Protein conformation and protein/protein interaction can be elucidated by solution-phase Hydrogen/ Deuterium exchange (sHDX) coupled to high-resolution mass analysis o...
Ernst Althaus, Stefan Canzar, Carsten Ehrler, Mark...