Sciweavers

7921 search results - page 89 / 1585
» LSH-preserving functions and their applications
Sort
View
BMCBI
2010
139views more  BMCBI 2010»
14 years 10 months ago
CMASA: an accurate algorithm for detecting local protein structural similarity and its application to enzyme catalytic site anno
Background: The rapid development of structural genomics has resulted in many "unknown function" proteins being deposited in Protein Data Bank (PDB), thus, the functiona...
Gong-Hua Li, Jing-Fei Huang
DAM
2006
88views more  DAM 2006»
14 years 10 months ago
Finding nonnormal bent functions
The question if there exist nonnormal bent functions was an open question for several years. A Boolean function in n variables is called normal if there exists an affine subspace ...
Anne Canteaut, Magnus Daum, Hans Dobbertin, Gregor...
PRL
1998
81views more  PRL 1998»
14 years 9 months ago
Lie generators for computing steerable functions
We present a computational, group-theoretic approach to steerable functions. The approach is group-theoretic in that the treatment involves continuous transformation groups for wh...
Patrick C. Teo, Yacov Hel-Or
FMCO
2003
Springer
123views Formal Methods» more  FMCO 2003»
15 years 3 months ago
Machine Function Based Control Code Algebras
Abstract. Machine functions have been introduced by Earley and Sturgis in [6] in order to provide a mathematical foundation of the use of the T-diagrams proposed by Bratman in [5]....
Jan A. Bergstra
FSTTCS
2003
Springer
15 years 3 months ago
Moderately Hard Functions: From Complexity to Spam Fighting
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
Moni Naor