Sciweavers

7821 search results - page 1462 / 1565
» Nested Ordered Sets and their Use for Data Modelling
Sort
View
CCS
2010
ACM
15 years 26 days ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
95
Voted
ALMOB
2008
124views more  ALMOB 2008»
15 years 24 days ago
A scoring matrix approach to detecting miRNA target sites
Background: Experimental identification of microRNA (miRNA) targets is a difficult and time consuming process. As a consequence several computational prediction methods have been ...
Simon Moxon, Vincent Moulton, Jan T. Kim
JUCS
2010
124views more  JUCS 2010»
14 years 11 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
CIKM
1999
Springer
15 years 5 months ago
Performance and Implications of Semantic Indexing in a Distributed Environment
A research prototype is presented for semantic indexing and retrieval in Information Retrieval. The prototype is motivated by a desire to provide a more efficient and effective in...
Conrad T. K. Chang, Bruce R. Schatz
GIS
2007
ACM
16 years 1 months ago
Smugglers and border guards: the GeoStar project at RPI
We present the GeoStar project at RPI, which researches various terrain (i.e., elevation) representations and operations thereon. This work is motivated by the large amounts of hi...
W. Randolph Franklin, Metin Inanc, Zhongyi Xie, Da...
« Prev « First page 1462 / 1565 Last » Next »