Sciweavers

191 search results - page 8 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
BMCBI
2005
107views more  BMCBI 2005»
13 years 8 months ago
Identifying differential expression in multiple SAGE libraries: an overdispersed log-linear model approach
Background: In testing for differential gene expression involving multiple serial analysis of gene expression (SAGE) libraries, it is critical to account for both between and with...
Jun Lu, John K. Tomfohr, Thomas B. Kepler
CCS
2003
ACM
14 years 1 months ago
Receiver anonymity via incomparable public keys
We describe a new method for protecting the anonymity of message receivers in an untrusted network. Surprisingly, existing methods fail to provide the required level of anonymity ...
Brent R. Waters, Edward W. Felten, Amit Sahai
VLSISP
2010
148views more  VLSISP 2010»
13 years 7 months ago
Energy-efficient Hardware Architecture and VLSI Implementation of a Polyphase Channelizer with Applications to Subband Adaptive
Abstract Polyphase channelizer is an important component of subband adaptive filtering systems. This paper presents an energy-efficient hardware architecture and VLSI implementatio...
Yongtao Wang, Hamid Mahmoodi, Lih-Yih Chiou, Hunso...
RAS
2007
115views more  RAS 2007»
13 years 8 months ago
A variational method for the recovery of dense 3D structure from motion
The purpose of this study is to investigate a variational formulation of the problem of three-dimensional (3D) interpretation of temporal image sequences based on the 3D brightnes...
Hicham Sekkati, Amar Mitiche
WWW
2005
ACM
14 years 9 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten