Sciweavers

3365 search results - page 550 / 673
» Multidimensional Data Modeling for Complex Data
Sort
View
PDCAT
2007
Springer
15 years 11 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
135
Voted
ISIPTA
2005
IEEE
155views Mathematics» more  ISIPTA 2005»
15 years 10 months ago
Estimation of Chaotic Probabilities
A Chaotic Probability model is a usual set of probability measures, M, the totality of which is endowed with an objective, frequentist interpretation as opposed to being viewed as...
Leandro Chaves Rêgo, Terrence L. Fine
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 10 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
WABI
2005
Springer
110views Bioinformatics» more  WABI 2005»
15 years 10 months ago
Alignment of Tandem Repeats with Excision, Duplication, Substitution and Indels (EDSI)
Abstract. Traditional sequence comparison by alignment applies a mutation model comprising two events, substitutions and indels (insertions or deletions) of single positions (SI). ...
Michael Sammeth, Thomas Weniger, Dag Harmsen, Jens...
ZUM
2005
Springer
136views Formal Methods» more  ZUM 2005»
15 years 10 months ago
Some Guidelines for Formal Development of Web-Based Applications in B-Method
Abstract. Web-based applications are the most common form of distributed systems that have gained a lot of attention in the past ten years. Today many of us are relying on scores o...
Abdolbaghi Rezazadeh, Michael J. Butler