Sciweavers

312 search results - page 46 / 63
» Problem Structure in the Presence of Perturbations
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 10 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
MICCAI
2002
Springer
15 years 10 months ago
New Approaches to Estimation of White Matter Connectivity in Diffusion Tensor MRI: Elliptic PDEs and Geodesics in a Tensor-Warpe
Abstract. We investigate new approaches to quantifying the white matter connectivity in the brain using Diffusion Tensor Magnetic Resonance Imaging data. Our first approach finds a...
Lauren O'Donnell, Steven Haker, Carl-Fredrik Westi...
BMCBI
2008
95views more  BMCBI 2008»
14 years 10 months ago
PURE: A webserver for the prediction of domains in unassigned regions in proteins
Background: Protein domains are the structural and functional units of proteins. The ability to parse proteins into different domains is important for effective classification, un...
Chilamakuri C. S. Reddy, Khader Shameer, Bernard O...
CORR
2010
Springer
165views Education» more  CORR 2010»
14 years 10 months ago
Cut-Elimination and Proof Search for Bi-Intuitionistic Tense Logic
We consider an extension of bi-intuitionistic logic with the traditional modalities , , and from tense logic Kt. Proof theoretically, this extension is obtained simply by extendin...
Rajeev Goré, Linda Postniece, Alwen Tiu