Sciweavers

2135 search results - page 355 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
BMCBI
2010
89views more  BMCBI 2010»
13 years 9 months ago
Spatial normalization improves the quality of genotype calling for Affymetrix SNP 6.0 arrays
Background: Microarray measurements are susceptible to a variety of experimental artifacts, some of which give rise to systematic biases that are spatially dependent in a unique w...
High-Seng Chai, Terry M. Therneau, Kent R. Bailey,...
IACR
2011
125views more  IACR 2011»
12 years 9 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
EGC
2005
Springer
14 years 2 months ago
Rapid Distribution of Tasks on a Commodity Grid
The global internet is rich in commodity resources but scarce in specialized resources. We argue that a grid framework can achieve better performance if it separates the management...
Ladislau Bölöni, Damla Turgut, Taskin Ko...
TRECVID
2007
13 years 10 months ago
Eurecom at TRECVid 2007: Extraction of High-level Features
In this paper we describe our experiments for the high level features extraction task of TRECVid 2007. Our approach is different than previous submissions in that we have impleme...
Rachid Benmokhtar, Eric Galmar, Benoit Huet
AINA
2009
IEEE
14 years 4 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee