Sciweavers

409 search results - page 79 / 82
» How to Design Practical Test Cases
Sort
View
CCS
2010
ACM
13 years 10 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
BMCBI
2008
160views more  BMCBI 2008»
13 years 9 months ago
Dynamic sensitivity analysis of biological systems
Background: A mathematical model to understand, predict, control, or even design a real biological system is a central theme in systems biology. A dynamic biological system is alw...
Wu Hsiung Wu, Feng Sheng Wang, Maw Shang Chang
BMCBI
2007
194views more  BMCBI 2007»
13 years 9 months ago
A meta-data based method for DNA microarray imputation
Background: DNA microarray experiments are conducted in logical sets, such as time course profiling after a treatment is applied to the samples, or comparisons of the samples unde...
Rebecka Jörnsten, Ming Ouyang, Hui-Yu Wang
JTAER
2006
100views more  JTAER 2006»
13 years 9 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
DC
1999
13 years 9 months ago
A Simple and Fast Asynchronous Consensus Protocol Based on a Weak Failure Detector
or fault-tolerant asynchronous systems. It abstracts a family of problems known as Agreement (or Coordination) problems. Any solution to consensus can serve as a basic building blo...
Michel Hurfin, Michel Raynal