Sciweavers

1926 search results - page 74 / 386
» Hierarchical Peer-to-Peer Systems
Sort
View
EUROCRYPT
2006
Springer
15 years 4 months ago
Practical Identity-Based Encryption Without Random Oracles
We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems
Craig Gentry
CODES
2005
IEEE
15 years 6 months ago
Comparing two testbench methods for hierarchical functional verification of a bluetooth baseband adaptor
The continuous improvement on the design methodologies and processes has made possible the creation of huge and very complex digital systems. Design verification is one of the mai...
Edgar L. Romero, Marius Strum, Wang Jiang Chau
ICCBR
2005
Springer
15 years 6 months ago
Navigating Through Case Base Competence
The development of large-scale case-based reasoning systems has increased the necessity of providing tools for analyzing the case base structure. In this paper we present a hierarc...
Maarten Grachten, F. Alejandro García, Jose...
BMCBI
2010
138views more  BMCBI 2010»
15 years 21 days ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
84
Voted
WWW
2005
ACM
16 years 1 months ago
Automatically learning document taxonomies for hierarchical classification
While several hierarchical classification methods have been applied to web content, such techniques invariably rely on a pre-defined taxonomy of documents. We propose a new techni...
Kunal Punera, Suju Rajan, Joydeep Ghosh