Sciweavers

7796 search results - page 1348 / 1560
» On Generalized Schur Numbers
Sort
View
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 4 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
BIBE
2006
IEEE
184views Bioinformatics» more  BIBE 2006»
15 years 4 months ago
A Language Modeling Text Mining Approach to the Annotation of Protein Community
This paper discusses an ontology based language modeling text mining approach to the annotation of protein community. Communities appear to play an important role in the functional...
Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, X...
CCECE
2006
IEEE
15 years 4 months ago
A Dynamic Associative E-Learning Model based on a Spreading Activation Network
Presenting information to an e-learning environment is a challenge, mostly, because ofthe hypertextlhypermedia nature and the richness ofthe context and information provides. This...
Phongchai Nilas, Nilamit Nilas, Somsak Mitatha
CODES
2006
IEEE
15 years 4 months ago
Data reuse driven energy-aware MPSoC co-synthesis of memory and communication architecture for streaming applications
The memory subsystem of a complex multiprocessor systemson-chip (MPSoC) is an important contributor to the chip power consumption. The selection of memory architecture, as well as...
Ilya Issenin, Nikil Dutt
FOCS
2006
IEEE
15 years 4 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...
« Prev « First page 1348 / 1560 Last » Next »