Sciweavers

541 search results - page 51 / 109
» Applications of nonstandard analysis in additive number theo...
Sort
View
BMCBI
2008
148views more  BMCBI 2008»
13 years 8 months ago
Automating dChip: toward reproducible sharing of microarray data analysis
Background: During the past decade, many software packages have been developed for analysis and visualization of various types of microarrays. We have developed and maintained the...
Cheng Li
JOC
2011
157views more  JOC 2011»
13 years 3 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
BMCBI
2006
179views more  BMCBI 2006»
13 years 8 months ago
Accurate and unambiguous tag-to-gene mapping in serial analysis of gene expression
Background: In this study, we present a robust and reliable computational method for tag-togene assignment in serial analysis of gene expression (SAGE). The method relies on curre...
Rodrigo Malig, Cristian Varela, Eduardo Agosin, Fr...

Presentation
1575views
15 years 7 months ago
Beyond Generating Transit Performance Measures: Visualizations and Statistical Analysis using Historical Data
In recent years, the use of performance measures for transit planning and operations has gained a great deal of attention, particularly as transit agencies are required to provide ...
M. Berkow, A. El-Geneidy, R.L. Bertini, D. Crout
CCS
2006
ACM
14 years 14 days ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...