Sciweavers

314 search results - page 55 / 63
» A Comparison of Known Codes, Random Codes, and the Best Code...
Sort
View
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
NAR
2006
142views more  NAR 2006»
13 years 7 months ago
miRNAMap: genomic maps of microRNA genes and their target genes in mammalian genomes
Recent work has demonstrated that microRNAs (miRNAs) are involved in critical biological processes by suppressing the translation of coding genes. This work develops an integrated...
Paul Wei-Che Hsu, Hsien-Da Huang, Sheng-Da Hsu, Li...
BMCBI
2005
113views more  BMCBI 2005»
13 years 7 months ago
Pathway level analysis of gene expression using singular value decomposition
Background: A promising direction in the analysis of gene expression focuses on the changes in expression of specific predefined sets of genes that are known in advance to be rela...
John K. Tomfohr, Jun Lu, Thomas B. Kepler
TIT
2010
128views Education» more  TIT 2010»
13 years 2 months ago
Shannon-theoretic limits on noisy compressive sampling
In this paper, we study the number of measurements required to recover a sparse signal in M with L nonzero coefficients from compressed samples in the presence of noise. We conside...
Mehmet Akçakaya, Vahid Tarokh
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 26 days ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay