Sciweavers

7892 search results - page 1427 / 1579
» Programming with Models
Sort
View
INDOCRYPT
2003
Springer
15 years 6 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ICDM
2002
IEEE
173views Data Mining» more  ICDM 2002»
15 years 6 months ago
Mining Genes in DNA Using GeneScout
In this paper, we present a new system, called GeneScout, for predicting gene structures in vertebrate genomic DNA. The system contains specially designed hidden Markov models (HM...
Michael M. Yin, Jason Tsong-Li Wang
ISPAN
2002
IEEE
15 years 6 months ago
Automatic Processor Lower Bound Formulas for Array Computations
In the directed acyclic graph (dag) model of algorithms, consider the following problem for precedence-constrained multiprocessor schedules for array computations: Given a sequenc...
Peter R. Cappello, Ömer Egecioglu
ISSRE
2002
IEEE
15 years 6 months ago
Inter-Class Mutation Operators for Java
The effectiveness of mutation testing depends heavily on the types of faults that the mutation operators are designed to represent. Therefore, the quality of the mutation operator...
Yu-Seung Ma, Yong Rae Kwon, Jeff Offutt
GECCO
2010
Springer
155views Optimization» more  GECCO 2010»
15 years 6 months ago
Evolutionary optimization of flavors
We have acquired panelist data that provides hedonic (liking) ratings for a set of 40 flavors each composed of the same 7 ingredients at different concentration levels. Our goal...
Kalyan Veeramachaneni, Katya Vladislavleva, Matt B...
« Prev « First page 1427 / 1579 Last » Next »