Sciweavers

7280 search results - page 1405 / 1456
» Optimization Techniques
Sort
View
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 4 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
DEXA
2005
Springer
148views Database» more  DEXA 2005»
15 years 4 months ago
XG: A Data-Driven Computation Grid for Enterprise-Scale Mining
In this paper we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. We show how such an architecture can be le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Wen-...
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 4 months ago
MDGA: motif discovery using a genetic algorithm
Computationally identifying transcription factor binding sites in the promoter regions of genes is an important problem in computational biology and has been under intensive resea...
Dongsheng Che, Yinglei Song, Khaled Rasheed
GECCO
2005
Springer
189views Optimization» more  GECCO 2005»
15 years 4 months ago
Molecular programming: evolving genetic programs in a test tube
We present a molecular computing algorithm for evolving DNA-encoded genetic programs in a test tube. The use of synthetic DNA molecules combined with biochemical techniques for va...
Byoung-Tak Zhang, Ha-Young Jang
ISMIR
2005
Springer
172views Music» more  ISMIR 2005»
15 years 4 months ago
Segmentation and Recognition of Tabla Strokes
A system that segments and labels tabla strokes from real performances is described. Performance is evaluated on a large database taken from three performers under different recor...
Parag Chordia
« Prev « First page 1405 / 1456 Last » Next »