Sciweavers

1088 search results - page 111 / 218
» Independence of Negative Constraints
Sort
View
CRYPTO
2006
Springer
149views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are co...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
ESANN
2004
14 years 11 months ago
Forbidden magnification? II
The twin of this paper, "Forbidden Magnification? I." [1], presents systematic SOM simulations with the explicit magnification control scheme of Bauer, Der, and Herrmann ...
Erzsébet Merényi, Abha Jain
IJCAI
1989
14 years 11 months ago
Chromatic Stereopsis
It is well known that chromatic information can assist in solving the stereo correspondence problem. It has also been suggested that there are two independent first-order stereop...
John R. Jordan III, Alan C. Bovik, Wilson S. Geisl...
BMCBI
2008
112views more  BMCBI 2008»
14 years 10 months ago
Evaluation of genomic island predictors using a comparative genomics approach
Background: Genomic islands (GIs) are clusters of genes in prokaryotic genomes of probable horizontal origin. GIs are disproportionately associated with microbial adaptations of m...
Morgan G. I. Langille, William W. L. Hsiao, Fiona ...
BMCBI
2010
88views more  BMCBI 2010»
14 years 10 months ago
Proteome scanning to predict PDZ domain interactions using support vector machines
Background: PDZ domains mediate protein-protein interactions involved in important biological processes through the recognition of short linear motifs in their target proteins. Tw...
Shirley Hui, Gary D. Bader