Sciweavers

270 search results - page 52 / 54
» A determinant property of Catalan numbers
Sort
View
ISSTA
2006
ACM
14 years 1 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
CCS
2003
ACM
14 years 21 days ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
SODA
2008
ACM
100views Algorithms» more  SODA 2008»
13 years 9 months ago
A tight lower bound for parity in noisy communication networks
We show a tight lower bound of (N log log N) on the number of transmission required to compute the parity of N bits (with constant error) in a network of N randomly placed sensors...
Chinmoy Dutta, Yashodhan Kanoria, D. Manjunath, Ja...
BMCBI
2010
105views more  BMCBI 2010»
13 years 7 months ago
Subdivision of the MDR superfamily of medium-chain dehydrogenases/reductases through iterative hidden Markov model refinement
Background: The Medium-chain Dehydrogenases/Reductases (MDR) form a protein superfamily whose size and complexity defeats traditional means of subclassification; it currently has ...
Joel Hedlund, Hans Jörnvall, Bengt Persson
BMCBI
2007
128views more  BMCBI 2007»
13 years 7 months ago
A Bayesian nonparametric method for prediction in EST analysis
Background: Expressed sequence tags (ESTs) analyses are a fundamental tool for gene identification in organisms. Given a preliminary EST sample from a certain library, several sta...
Antonio Lijoi, Ramsés H. Mena, Igor Prü...