Sciweavers

1116 search results - page 190 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
129
Voted
FSE
2005
Springer
153views Cryptology» more  FSE 2005»
15 years 7 months ago
F-FCSR: Design of a New Class of Stream Ciphers
In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This au...
François Arnault, Thierry P. Berger
PLDI
2004
ACM
15 years 7 months ago
Jedd: a BDD-based relational extension of Java
In this paper we present Jedd, a language extension to Java that supports a convenient way of programming with Binary Decision Diagrams (BDDs). The Jedd language abstracts BDDs as...
Ondrej Lhoták, Laurie J. Hendren
PODS
2009
ACM
119views Database» more  PODS 2009»
16 years 2 months ago
Dynamic indexability and lower bounds for dynamic one-dimensional range query indexes
The B-tree is a fundamental external index structure that is widely used for answering one-dimensional range reporting queries. Given a set of N keys, a range query can be answere...
Ke Yi
COCO
2006
Springer
118views Algorithms» more  COCO 2006»
15 years 6 months ago
Learning Monotone Decision Trees in Polynomial Time
We give an algorithm that learns any monotone Boolean function f : {-1, 1}n {-1, 1} to any constant accuracy, under the uniform distribution, in time polynomial in n and in the de...
Ryan O'Donnell, Rocco A. Servedio
114
Voted
BMCBI
2008
171views more  BMCBI 2008»
15 years 2 months ago
Comparative analysis of five protein-protein interaction corpora
Background: Growing interest in the application of natural language processing methods to biomedical text has led to an increasing number of corpora and methods targeting protein-...
Sampo Pyysalo, Antti Airola, Juho Heimonen, Jari B...