Sciweavers

1713 search results - page 284 / 343
» Analysis of Procedure Splitability
Sort
View
CCS
2010
ACM
13 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
BMCBI
2011
13 years 4 months ago
GCOD - GeneChip Oncology Database
Background: DNA microarrays have become a nearly ubiquitous tool for the study of human disease, and nowhere is this more true than in cancer. With hundreds of studies and thousan...
Fenglong Liu, Joseph White, Corina Antonescu, John...
JMLR
2011
142views more  JMLR 2011»
13 years 4 months ago
Causal Search in Structural Vector Autoregressive Models
This paper reviews a class of methods to perform causal inference in the framework of a structural vector autoregressive model. We consider three different settings. In the first ...
Alessio Moneta, Nadine Chlass, Doris Entner, Patri...
NFM
2011
223views Formal Methods» more  NFM 2011»
13 years 4 months ago
opaal: A Lattice Model Checker
Abstract. We present a new open source model checker, opaal, for automatic verification of models using lattice automata. Lattice automata allow the users to incorporate abstracti...
Andreas Engelbredt Dalsgaard, René Rydhof H...
MEMICS
2010
13 years 4 months ago
Modeling Gene Networks using Fuzzy Logic
Recently, almost uncontrolled technological progress allows so called high-throughput data collection for sophisticated and complex experimental biological systems analysis. Espec...
Artur Gintrowski