Sciweavers

62 search results - page 11 / 13
» Competitive Privacy: Secure Analysis on Integrated Sequence ...
Sort
View
BMCBI
2006
126views more  BMCBI 2006»
13 years 7 months ago
A Regression-based K nearest neighbor algorithm for gene function prediction from heterogeneous data
Background: As a variety of functional genomic and proteomic techniques become available, there is an increasing need for functional analysis methodologies that integrate heteroge...
Zizhen Yao, Walter L. Ruzzo
CCS
2010
ACM
13 years 7 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
ISI
2004
Springer
14 years 12 days ago
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
Abstract. Information technologies and infectious disease informatics are playing an increasingly important role in preventing, detecting, and managing infectious disease outbreaks...
Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Ca...
ICICS
2004
Springer
14 years 13 days ago
Adaptive-CCA on OpenPGP Revisited
E-mail system has become one of the most important and popular Internet services. Instead of using traditional surface mail, we have the alternative of employing e-mail system whic...
Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen
IWSEC
2009
Springer
14 years 1 months ago
Improved Distinguishing Attacks on HC-256
The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM com...
Gautham Sekar, Bart Preneel