Sciweavers

206 search results - page 32 / 42
» Analysis of Multivariate Hash Functions
Sort
View
TC
2008
13 years 9 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
IPPS
2007
IEEE
14 years 4 months ago
VoroNet: A scalable object network based on Voronoi tessellations
In this paper, we propose the design of VoroNet, an objectbased peer to peer overlay network relying on Voronoi tessellations, along with its theoretical analysis and experimental...
Olivier Beaumont, Anne-Marie Kermarrec, Loris Marc...
WSC
2007
14 years 3 hour ago
Visual exploration and evaluation of climate-related simulation data
Large, heterogeneous volumes of simulation data are calculated and stored in many disciplines, e.g. in climate and climate impact research. To gain insight, current climate analys...
Thomas Nocke, Michael Flechsig, Uwe Böhm
CORR
2011
Springer
150views Education» more  CORR 2011»
13 years 4 months ago
Total variation regularization for fMRI-based prediction of behaviour
—While medical imaging typically provides massive amounts of data, the extraction of relevant information for predictive diagnosis remains a difficult challenge. Functional MRI ...
Vincent Michel, Alexandre Gramfort, Gaël Varo...
BMCBI
2010
153views more  BMCBI 2010»
13 years 9 months ago
Pash 3.0: A versatile software package for read mapping and integrative analysis of genomic and epigenomic variation using massi
Background: Massively parallel sequencing readouts of epigenomic assays are enabling integrative genome-wide analyses of genomic and epigenomic variation. Pash 3.0 performs sequen...
Cristian Coarfa, Fuli Yu, Christopher A. Miller, Z...