Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
—We describe a graphics system that significantly improves the visual quality of certain types of 3D character motion animated through traditional means by inferring physical pr...
Software developers writing new software have strong incentives to make their products compliant to standards such as corba, com, and JavaBeans. Standardscompliance facilitates in...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
Despite the growing interest for component-based systems, few works tackle the question of the trust we can bring into a component. This paper presents a method and a tool for bui...
Motivation: Clustering technique is used to find groups of genes that show similar expression patterns under multiple experimental conditions. Nonetheless, the results obtained by...
Dae-Won Kim, Ki Young Lee, Kwang H. Lee, Doheon Le...