Sciweavers

7434 search results - page 134 / 1487
» Still
Sort
View
DAM
2006
81views more  DAM 2006»
15 years 4 months ago
Equivalence-free exhaustive generation of matroid representations
Abstract. In this paper we present an algorithm for the problem of exhaustive equivalence-free generation of 3-connected matroids which are represented by a matrix over some finite...
Petr Hlinený
BMCBI
2007
94views more  BMCBI 2007»
15 years 4 months ago
Transcriptional regulation at a glance
Considering that 80 genomes have been sequenced, providing us with the static information of the genome, it is still a long way to reveal the relationship between complex genotype...
Silke Sperling
IJNSEC
2008
106views more  IJNSEC 2008»
15 years 4 months ago
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem by employing Extended Euclidean algorithm. They claimed that the proposed scheme was untraceable...
Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang
IJFCS
2006
132views more  IJFCS 2006»
15 years 4 months ago
Generalized Lr Parsing Algorithm for Boolean Grammars
The generalized LR parsing algorithm for context-free grammars is extended for the case of Boolean grammars, which are a generalization of the context-free grammars with logical c...
Alexander Okhotin
IJNSEC
2006
92views more  IJNSEC 2006»
15 years 4 months ago
Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards
Recently, Yang et al. improved Yang and Shieh's two password authentication schemes to withstand Sun and Yeh's forgery attacks. However, Kim et al. pointed out that Yang...
Ren-Chiun Wang, Chou Chen Yang