Sciweavers

1099 search results - page 220 / 220
» String Transformation Learning
Sort
View
110
Voted
NAR
2011
208views Computer Vision» more  NAR 2011»
14 years 2 months ago
The UCSC Genome Browser database: update 2011
The University of California, Santa Cruz Genome Browser (http://genome.ucsc.edu) offers online access to a database of genomic sequence and annotation data for a wide variety of o...
Pauline A. Fujita, Brooke L. Rhead, Ann S. Zweig, ...
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan

Publication
173views
13 years 10 months ago
Max-Flow Segmentation of the Left Ventricle by Recovering Subject-Specific Distributions via a Bound of the Bhattacharyya Measur
This study investigates fast detection of the left ventricle (LV) endo- and epicardium boundaries in a cardiac magnetic resonance (MR) sequence following the optimization of two or...
Ismail Ben Ayed, Hua-mei Chen, Kumaradevan Punitha...
WWW
2003
ACM
16 years 10 days ago
Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks
RDF-based P2P networks have a number of advantages compared with simpler P2P networks such as Napster, Gnutella or with approaches based on distributed indices such as CAN and CHO...
Alexander Löser, Christoph Schmitz, Ingo Brun...