Sciweavers

18090 search results - page 3616 / 3618
» Computing by Only Observing
Sort
View
BMCBI
2008
129views more  BMCBI 2008»
13 years 8 months ago
Motif-directed network component analysis for regulatory network inference
Background: Network Component Analysis (NCA) has shown its effectiveness in discovering regulators and inferring transcription factor activities (TFAs) when both microarray data a...
Chen Wang, Jianhua Xuan, Li Chen, Po Zhao, Yue Wan...
JCSS
2008
120views more  JCSS 2008»
13 years 8 months ago
Quantum certificate complexity
Given a Boolean function f, we study two natural generalizations of the certificate complexity C (f): the randomized certificate complexity RC (f) and the quantum certificate comp...
Scott Aaronson
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 8 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
BMCBI
2005
136views more  BMCBI 2005»
13 years 8 months ago
Identification of clustered microRNAs using an ab initio prediction method
Background: MicroRNAs (miRNAs) are endogenous 21 to 23-nucleotide RNA molecules that regulate protein-coding gene expression in plants and animals via the RNA interference pathway...
Alain Sewer, Nicodème Paul, Pablo Landgraf,...
TCS
2010
13 years 6 months ago
Itineraries of rigid rotations and diffeomorphisms of the circle
We examine the itinerary of 0 ∈ S1 = R/Z under the rotation by α ∈ R\Q. The motivating question is: if we are given only the itinerary of 0 relative to I ⊂ S1 , a finite un...
David Richeson, Paul Winkler, Jim Wiseman
« Prev « First page 3616 / 3618 Last » Next »