Sciweavers

14190 search results - page 2659 / 2838
» computing 2008
Sort
View
92
Voted
EL
2011
86views more  EL 2011»
14 years 3 months ago
The use of metadata and preservation methods for continuous access to digital data
Data loss prevention starts with the creation of a digital object. However, methods to minimize the loss of digital data are often ignored, the use of metadata structures embedded...
Ria Groenewald, Amelia Breytenbach
125
Voted
IACR
2011
121views more  IACR 2011»
14 years 3 months ago
Two RFID Privacy Models in Front of a Court
In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited...
Mohammad Hassan Habibi, Mohammad Reza Aref
138
Voted
SODA
2012
ACM
217views Algorithms» more  SODA 2012»
13 years 5 months ago
Deterministic construction of an approximate M-ellipsoid and its applications to derandomizing lattice algorithms
We give a deterministic O(log n)n -time and space algorithm for the Shortest Vector Problem (SVP) of a lattice under any norm, improving on the previous best deterministic nO(n) -...
Daniel Dadush, Santosh Vempala
BMCBI
2008
129views more  BMCBI 2008»
15 years 3 months ago
Motif-directed network component analysis for regulatory network inference
Background: Network Component Analysis (NCA) has shown its effectiveness in discovering regulators and inferring transcription factor activities (TFAs) when both microarray data a...
Chen Wang, Jianhua Xuan, Li Chen, Po Zhao, Yue Wan...
JCSS
2008
120views more  JCSS 2008»
15 years 3 months ago
Quantum certificate complexity
Given a Boolean function f, we study two natural generalizations of the certificate complexity C (f): the randomized certificate complexity RC (f) and the quantum certificate comp...
Scott Aaronson
« Prev « First page 2659 / 2838 Last » Next »