Sciweavers

963 search results - page 186 / 193
» Conditional Digital Signatures
Sort
View
AI
2010
Springer
13 years 7 months ago
Optimal query complexity bounds for finding graphs
We consider the problem of finding an unknown graph by using two types of queries with an additive property. Given a graph, an additive query asks the number of edges in a set of ...
Sung-Soon Choi, Jeong Han Kim
BIODATAMINING
2008
178views more  BIODATAMINING 2008»
13 years 7 months ago
Clustering-based approaches to SAGE data mining
Serial analysis of gene expression (SAGE) is one of the most powerful tools for global gene expression profiling. It has led to several biological discoveries and biomedical appli...
Haiying Wang, Huiru Zheng, Francisco Azuaje
BMCBI
2010
132views more  BMCBI 2010»
13 years 7 months ago
Data structures and compression algorithms for high-throughput sequencing technologies
Background: High-throughput sequencing (HTS) technologies play important roles in the life sciences by allowing the rapid parallel sequencing of very large numbers of relatively s...
Kenny Daily, Paul Rigor, Scott Christley, Xiaohui ...
IJHCI
2008
92views more  IJHCI 2008»
13 years 7 months ago
Coupling the Users: The Benefits of Paired User Testing for iDTV
Interactive digital television (iDTV) is a social medium and must therefore be tested in a context as close to real life as possible. This explains why we saw the potential and im...
Tara Shrimpton-Smith, Bieke Zaman, David Geerts
IEEESP
2006
130views more  IEEESP 2006»
13 years 7 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...