Sciweavers

1661 search results - page 205 / 333
» Real-time specification patterns
Sort
View
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 11 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
BMCBI
2010
105views more  BMCBI 2010»
15 years 1 months ago
Comparison of PGH2 binding site in prostaglandin synthases
Background: Prostaglandin H2 (PGH2) is a common precursor for the synthesis of five different Prostanoids via specific Prostanoid Synthases. The binding of this substrate with the...
Padmapriya Paragi-Vedanthi, Mukesh Doble
CORR
2011
Springer
183views Education» more  CORR 2011»
14 years 8 months ago
Automatic Network Fingerprinting through Single-Node Motifs
Complex networks have been characterised by their specific connectivity patterns (network motifs), but their building blocks can also be identified and described by node-motifs—...
Christoph Echtermeyer, Luciano da Fontoura Costa, ...
ICCV
2007
IEEE
16 years 3 months ago
Depth Information by Stage Classification
Recently, methods for estimating 3D scene geometry or absolute scene depth information from 2D image content have been proposed. However, general applicability of these methods in...
André Redert, Arnold W. M. Smeulders, Jan-M...
VIS
2004
IEEE
93views Visualization» more  VIS 2004»
16 years 2 months ago
Investigating Swirl and Tumble Flow with a Comparison of Visualization Techniques
We investigate two important, common fluid flow patterns from computational fluid dynamics (CFD) simulations, namely, swirl and tumble motion typical of automotive engines. We stu...
Robert S. Laramee, Daniel Weiskopf, Jürgen Sc...