Sciweavers

406 search results - page 21 / 82
» PASSing the provenance challenge
Sort
View
EUROCRYPT
2010
Springer
15 years 2 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
CVPR
2009
IEEE
1696views Computer Vision» more  CVPR 2009»
16 years 4 months ago
Fast Normalized Cut with Linear Constraints
Normalized Cut is a widely used technique for solving a variety of problems. Although finding the optimal normalized cut has proven to be NP-hard, spectral relaxations can be ap...
Linli Xu (University of Alberta), Wenye Li (Univer...
MICCAI
2006
Springer
15 years 10 months ago
Retina Mosaicing Using Local Features
Abstract. Laser photocoagulation is a proven procedure to treat various pathologies of the retina. Challenges such as motion compensation, correct energy dosage, and avoiding incid...
Gábor Székely, Herbert Bay, Luc J. V...
ECOOP
2009
Springer
15 years 10 months ago
Implicit Dynamic Frames: Combining Dynamic Frames and Separation Logic
The dynamic frames approach has proven to be a powerful formalism for specifying and verifying object-oriented programs. However, it requires writing and checking many frame annota...
Jan Smans, Bart Jacobs 0002, Frank Piessens
RECOMB
2008
Springer
15 years 10 months ago
Fast and Accurate Alignment of Multiple Protein Networks
Comparative analysis of protein networks has proven to be a powerful approach for elucidating network structure and predicting protein function and interaction. A fundamental chall...
Maxim Kalaev, Vineet Bafna, Roded Sharan