Sciweavers

671 search results - page 133 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
BMCBI
2007
123views more  BMCBI 2007»
13 years 8 months ago
Heritable clustering and pathway discovery in breast cancer integrating epigenetic and phenotypic data
Background: In order to recapitulate tumor progression pathways using epigenetic data, we developed novel clustering and pathway reconstruction algorithms, collectively referred t...
Zailong Wang, Pearlly Yan, Dustin P. Potter, Chari...
BMCBI
2005
120views more  BMCBI 2005»
13 years 8 months ago
SpectralNET - an application for spectral graph analysis and visualization
Background: Graph theory provides a computational framework for modeling a variety of datasets including those emerging from genomics, proteomics, and chemical genetics. Networks ...
Joshua J. Forman, Paul A. Clemons, Stuart L. Schre...
FMICS
2009
Springer
14 years 3 months ago
A Rigorous Methodology for Composing Services
on Abstraction: a Lightweight Approach to Modelling Concurrency. Javier de Dios and Ricardo Peña Certified Implementation on top of the Java Virtual Machine 19:00 Social dinner + ...
Kenneth J. Turner, Koon Leai Larry Tan
JAR
2000
145views more  JAR 2000»
13 years 8 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 9 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny