Sciweavers

19130 search results - page 3687 / 3826
» Modelling multi-path problems
Sort
View
122
Voted
WALCOM
2010
IEEE
230views Algorithms» more  WALCOM 2010»
15 years 9 months ago
Comparing RNA Structures with Biologically Relevant Operations Cannot Be Done without Strong Combinatorial Restrictions
Abstract. Arc-annotated sequences are useful for representing structural information of RNAs and have been extensively used for comparing RNA structures in both terms of sequence a...
Guillaume Blin, Sylvie Hamel, Stéphane Vial...
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 9 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
TEI
2010
ACM
147views Hardware» more  TEI 2010»
15 years 9 months ago
A robust and accurate 3d hand posture estimation method for interactive systems
In this paper, a new 3D hand posture estimation system using a single camera and 3 interactive systems are introduced. Existing hand gesture recognition systems estimate hand'...
Emi Tamaki
ACSAC
2009
IEEE
15 years 9 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
150
Voted
BIBM
2009
IEEE
206views Bioinformatics» more  BIBM 2009»
15 years 9 months ago
Application of Kernel Functions for Accurate Similarity Search in Large Chemical Databases
Background: Similaritysearch in chemical structure databases is an important problem with many applications in chemical genomics, drug design, and efficient chemical probe screeni...
Xiaohong Wang, Jun Huan, Aaron M. Smalter, Gerald ...
« Prev « First page 3687 / 3826 Last » Next »