Sciweavers

780 search results - page 116 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
ADHOC
2006
87views more  ADHOC 2006»
13 years 7 months ago
Medium Access Control protocols for ad hoc wireless networks: A survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols a...
Sunil Kumar, Vineet S. Raghavan, Jing Deng
ISCI
2008
83views more  ISCI 2008»
13 years 7 months ago
A diversity maintaining population-based incremental learning algorithm
In this paper we propose a new probability update rule and sampling procedure for population-based incremental learning. These proposed methods are based on the concept of opposit...
Mario Ventresca, Hamid R. Tizhoosh
ISMB
2008
13 years 10 months ago
Classification of arrayCGH data using fused SVM
Motivation: Array-based comparative genomic hybridization (arrayCGH) has recently become a popular tool to identify DNA copy number variations along the genome. These profiles are...
Franck Rapaport, Emmanuel Barillot, Jean-Philippe ...
BMCBI
2008
108views more  BMCBI 2008»
13 years 7 months ago
A nonparametric model for quality control of database search results in shotgun proteomics
Background: Analysis of complex samples with tandem mass spectrometry (MS/MS) has become routine in proteomic research. However, validation of database search results creates a bo...
Jiyang Zhang, Jianqi Li, Xin Liu, Hongwei Xie, Yun...
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
14 years 1 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang