Sciweavers

247 search results - page 43 / 50
» A New Cryptosystem Based On Hidden Order Groups
Sort
View
DATE
2008
IEEE
223views Hardware» more  DATE 2008»
14 years 1 months ago
Cooperative Safety: a Combination of Multiple Technologies
—Governmental Transportation Authorities' interest in Car to Car and Car to Infrastructure has grown dramatically over the last few years in order to increase the road safet...
Raffaele Penazzi, Piergiorgio Capozio, Martin Dunc...
BMCBI
2010
104views more  BMCBI 2010»
13 years 6 months ago
Bidirectional best hit r-window gene clusters
Background: Conserved gene clusters are groups of genes that are located close to one another in the genomes of several species. They tend to code for proteins that have a functio...
Melvin Zhang, Hon Wai Leong
DATAMINE
2006
127views more  DATAMINE 2006»
13 years 6 months ago
Computing LTS Regression for Large Data Sets
Least trimmed squares (LTS) regression is based on the subset of h cases (out of n) whose least squares t possesses the smallest sum of squared residuals. The coverage h may be se...
Peter Rousseeuw, Katrien van Driessen
NAR
2000
182views more  NAR 2000»
13 years 6 months ago
tmRDB (tmRNA database)
Maintained at the University of Texas Health Science Center at Tyler, Texas, the tmRNA database (tmRDB) is accessible at the URL http://psyche.uthct.edu/dbs/ tmRDB/tmRDB.html with...
Christian Zwieb, Jacek Wower
ACSAC
2009
IEEE
14 years 1 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...