Sciweavers

166 search results - page 19 / 34
» Analysis of the Bit-Search Generator and Sequence Compressio...
Sort
View
BMCBI
2010
130views more  BMCBI 2010»
13 years 8 months ago
MLPAinter for MLPA interpretation: an integrated approach for the analysis, visualisation and data management of Multiplex Ligat
Background: Multiplex Ligation-Dependent Probe Amplification (MLPA) is an application that can be used for the detection of multiple chromosomal aberrations in a single experiment...
Ronald van Eijk, Paul H. C. Eilers, Remco Natt&eac...
PASTE
2010
ACM
14 years 1 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
ACNS
2010
Springer
154views Cryptology» more  ACNS 2010»
14 years 1 months ago
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
To this day, realizations in the standard-model of (lossy) trapdoor functions from discrete-log-type assumptions require large public key sizes, e.g., about Θ(λ2 ) group elements...
Xavier Boyen, Brent Waters
SI3D
2005
ACM
14 years 2 months ago
Level-of-detail representation of bidirectional texture functions for real-time rendering
This paper presents a new technique for rendering bidirectional texture functions (BTFs) at different levels of detail (LODs). Our method first decomposes each BTF image into mul...
Wan-Chun Ma, Sung-Hsiang Chao, Yu-Ting Tseng, Yung...
CCS
2007
ACM
14 years 2 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia