Back to Results
First PageMeta Content
Dynamic programming / Computational science / Smith–Waterman algorithm / Sequence alignment / Sequence analysis / Needleman–Wunsch algorithm / Nucleic acid sequence / BLAST / FASTA / Computational phylogenetics / Bioinformatics / Science


Toward A Practical Data Privacy Scheme for A Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm∗ Doug Szajda Michael Pohl Jason Owen
Add to Reading List

Document Date: 2006-02-09 00:38:24


Open Document

File Size: 172,93 KB

Share Result on Facebook

Company

GenBank / Health GenBank / /

/

Facility

Waterman Genome Sequence Comparison Algorithm∗ Doug Szajda Michael Pohl Jason Owen Barry Lawson University of Richmond Richmond / /

IndustryTerm

data privacy solution / real-world applications / Good encryption algorithms / non-interactive protocol / volunteer computing platforms / mobile wireless devices / distributed computing settings / local nucleotide sequence comparison algorithm / biotechnology industry / important applications / confidentiality protocols / Secure circuit evaluation protocols / spare processor / encryption algorithms / data mining / important real-world algorithm / volunteer distributed computing platforms / dynamic programming algorithm / trusted central control server / statistical applications / computing / few real-world applications / /

Organization

National Science Foundation / Smith-Waterman Genome Sequence Comparison Algorithm∗ Doug Szajda Michael Pohl Jason Owen Barry Lawson University of Richmond Richmond / /

Position

supervisor / general data privacy solution / term supervisor / molecular biologist / /

Product

Smith-Waterman / pri8 Extreme Value / /

ProvinceOrState

Virginia / /

Technology

encryption / screen saver / two-party protocol / unmodified SmithWaterman algorithm / modified Smith-Waterman algorithm / encryption algorithms / Smith-Waterman local nucleotide sequence comparison algorithm / transformed algorithm / wireless devices / Secure circuit evaluation protocols / biotechnology / modified algorithm / data mining / cell phones / dynamic programming algorithm / Good encryption algorithms / simulation / Smith-Waterman algorithm / unmodified algorithm / unmodified Smith-Waterman algorithm / non-interactive protocol / Interactive confidentiality protocols / /

SocialTag