Sciweavers

17471 search results - page 3336 / 3495
» Information Modeling
Sort
View
CCS
2010
ACM
15 years 20 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
BMCBI
2010
148views more  BMCBI 2010»
14 years 11 months ago
SKPDB: a structural database of shikimate pathway enzymes
Background: The functional and structural characterisation of enzymes that belong to microbial metabolic pathways is very important for structure-based drug design. The main inter...
Helen A. Arcuri, Geraldo F. D. Zafalon, Evandro A....
BMCBI
2011
14 years 11 months ago
Worm Phenotype Ontology: integrating phenotype data within and beyond the C. elegans community
Background: Caenorhabditis elegans gene-based phenotype information dates back to the 1970’s, beginning with Sydney Brenner and the characterization of behavioral and morphologi...
Gary Schindelman, Jolene Fernandes, Carol Bastiani...
CORR
2010
Springer
139views Education» more  CORR 2010»
14 years 11 months ago
On Communication over Unknown Sparse Frequency-Selective Block-Fading Channels
The problem of reliable communication over unknown frequency-selective block-fading channels with sparse impulse responses is considered. In particular, discrete-time impulse respo...
Arun Pachai Kannu, Philip Schniter
IJRR
2011
159views more  IJRR 2011»
14 years 11 months ago
Learning visual representations for perception-action systems
We discuss vision as a sensory modality for systems that effect actions in response to perceptions. While the internal representations informed by vision may be arbitrarily compl...
Justus H. Piater, Sébastien Jodogne, Renaud...
« Prev « First page 3336 / 3495 Last » Next »