Sciweavers

1767 search results - page 272 / 354
» An Integrated Model for Cellular Analysis
Sort
View
168
Voted
CSFW
2012
IEEE
13 years 6 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
149
Voted
IDA
2009
Springer
15 years 1 months ago
Estimating Hidden Influences in Metabolic and Gene Regulatory Networks
We address the applicability of blind source separation (BSS) methods for the estimation of hidden influences in biological dynamic systems such as metabolic or gene regulatory net...
Florian Blöchl, Fabian J. Theis
156
Voted
WOSP
2004
ACM
15 years 9 months ago
From UML activity diagrams to Stochastic Petri nets: application to software performance engineering
Over the last decade, the relevance of performance evaluation in the early stages of the software development life-cycle has been steadily rising. We honestly believe that the int...
Juan Pablo López-Grao, José Mersegue...
134
Voted
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
15 years 5 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...
SEC
2008
15 years 5 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans