Sciweavers

4101 search results - page 15 / 821
» Differential Power Analysis
Sort
View
DAC
2007
ACM
13 years 11 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
ICIC
2007
Springer
14 years 1 months ago
Analysis of Pi Series and Its Application to Image Encryption
Whether constant π (i.e., pi) is normal is a confusing problem without any strict theoretical demonstration except for some statistical proof. A new concept of pi series is introd...
Ting Chen, Feng Li
BMCBI
2006
100views more  BMCBI 2006»
13 years 7 months ago
Empirical array quality weights in the analysis of microarray data
Background: Assessment of array quality is an essential step in the analysis of data from microarray experiments. Once detected, less reliable arrays are typically excluded or &qu...
Matthew E. Ritchie, Dileepa S. Diyagama, Jody Neil...
BMCBI
2010
118views more  BMCBI 2010»
13 years 7 months ago
Testing for mean and correlation changes in microarray experiments: an application for pathway analysis
Background: Microarray experiments examine the change in transcript levels of tens of thousands of genes simultaneously. To derive meaningful data, biologists investigate the resp...
Mayer Alvo, Zhongzhu Liu, Andrew Williams, Carole ...
BMCBI
2010
136views more  BMCBI 2010»
13 years 7 months ago
Bias correction and Bayesian analysis of aggregate counts in SAGE libraries
Background: Tag-based techniques, such as SAGE, are commonly used to sample the mRNA pool of an organism's transcriptome. Incomplete digestion during the tag formation proces...
Russell L. Zaretzki, Michael A. Gilchrist, William...