Sciweavers

2648 search results - page 43 / 530
» Human Factors In Computer Security
Sort
View
CSB
2003
IEEE
124views Bioinformatics» more  CSB 2003»
15 years 3 months ago
SMASHing regulatory sites in DNA by human
Regulatory sequence elements provide important clues to understanding and predicting gene expression. Although the binding sites for hundreds of transcription factors are known, t...
Mihaela Zavolan, Nicholas D. Socci, Nikolaus Rajew...
ASIACRYPT
2005
Springer
15 years 3 months ago
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Abstract. We give improved upper bounds on the communication complexity of optimally-resilient secure multiparty computation in the cryptographic model. We consider evaluating an n...
Martin Hirt, Jesper Buus Nielsen
SLSFS
2005
Springer
15 years 3 months ago
Incorporating Constraints and Prior Knowledge into Factorization Algorithms - An Application to 3D Recovery
Abstract. Matrix factorization is a fundamental building block in many computer vision and machine learning algorithms. In this work we focus on the problem of ”structure from mo...
Amit Gruber, Yair Weiss
ICCSA
2005
Springer
15 years 3 months ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez
ICML
2009
IEEE
15 years 10 months ago
Factored conditional restricted Boltzmann Machines for modeling motion style
The Conditional Restricted Boltzmann Machine (CRBM) is a recently proposed model for time series that has a rich, distributed hidden state and permits simple, exact inference. We ...
Graham W. Taylor, Geoffrey E. Hinton