Sciweavers

401 search results - page 51 / 81
» Delegatable Functional Signatures
Sort
View
ECCC
2010
78views more  ECCC 2010»
13 years 8 months ago
PCPs and the Hardness of Generating Synthetic Data
Assuming the existence of one-way functions, we show that there is no polynomial-time, differentially private algorithm A that takes a database D ({0, 1}d )n and outputs a "...
Jonathan Ullman, Salil P. Vadhan
JCB
2006
185views more  JCB 2006»
13 years 8 months ago
Identification of Amino Acid Latent Periodicity within 94 Protein Families
Here, we have applied information decomposition, cyclic profile alignment, and noise decomposition techniques to search for latent repeats within protein families of various funct...
Vera P. Turutina, Andrew A. Laskin, Nikolay A. Kud...
JCB
2006
97views more  JCB 2006»
13 years 8 months ago
Wavelet Analysis of DNA Walks
A wavelet transform of the DNA "walk" constructed from a genomic sequence offers a direct visualization of short and long-range patterns in nucleotide sequences. We stud...
Adrian D. Haimovich, Bruce Byrne, Ramakrishna Rama...
BMCBI
2011
13 years 3 months ago
The PathOlogist: An Automated Tool for Pathway-Centric Analysis
Background: The PathOlogist is a new tool designed to transform large sets of gene expression data into quantitative descriptors of pathway-level behavior. The tool aims to provid...
Sharon I. Greenblum, Sol Efroni, Carl F. Schaefer,...
ASIACRYPT
2011
Springer
12 years 8 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin