Sciweavers

3775 search results - page 574 / 755
» The Expression Problem Revisited
Sort
View
COMPLIFE
2005
Springer
15 years 10 months ago
Robust Perron Cluster Analysis for Various Applications in Computational Life Science
In the present paper we explain the basic ideas of Robust Perron Cluster Analysis (PCCA+) and exemplify the different application areas of this new and powerful method. Recently, ...
Marcus Weber, Susanna Kube
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
EGC
2005
Springer
15 years 10 months ago
XDTM: The XML Data Type and Mapping for Specifying Datasets
We are concerned with the following problem: How do we allow a community of users to access and process diverse data stored in many different formats? Standard data formats and da...
Luc Moreau, Yong Zhao, Ian T. Foster, Jens-S. V&ou...
151
Voted
EMO
2005
Springer
108views Optimization» more  EMO 2005»
15 years 10 months ago
Multi-objective Model Optimization for Inferring Gene Regulatory Networks
With the invention of microarray technology, researchers are able to measure the expression levels of ten thousands of genes in parallel at various time points of a biological proc...
Christian Spieth, Felix Streichert, Nora Speer, An...