Sciweavers

2960 search results - page 82 / 592
» The Culture Based Model: Constructing a Model of Culture
Sort
View
101
Voted
IJNSEC
2008
147views more  IJNSEC 2008»
15 years 18 days ago
Constructing Efficient Certificateless Public Key Encryption with Pairing
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic ser...
Yijuan Shi, Jianhua Li, Jianjun Shi
84
Voted
SIAMMAX
2010
105views more  SIAMMAX 2010»
14 years 7 months ago
Construction of Covariance Matrices with a Specified Discrepancy Function Minimizer, with Application to Factor Analysis
The main goal of this paper is to develop a numerical procedure for construction of covariance matrices such that for a given covariance structural model and a discrepancy function...
So Yeon Chun, A. Shapiro
BMCBI
2010
110views more  BMCBI 2010»
15 years 21 days ago
Towards the systematic discovery of signal transduction networks using phosphorylation dynamics data
Background: Phosphorylation is a ubiquitous and fundamental regulatory mechanism that controls signal transduction in living cells. The number of identified phosphoproteins and th...
Haruna Imamura, Nozomu Yachie, Rintaro Saito, Yasu...
ACNS
2009
Springer
147views Cryptology» more  ACNS 2009»
14 years 10 months ago
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion fro...
Seiko Arita, Koji Tsurudome
127
Voted
DCC
1992
IEEE
15 years 4 months ago
Constructing Word-Based Text Compression Algorithms
Text compression algorithms are normally defined in terms of a source alphabet of 8-bit ASCII codes. We consider choosing to be an alphabet whose symbols are the words of Englis...
R. Nigel Horspool, Gordon V. Cormack