Sciweavers

641 search results - page 71 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
CCS
2008
ACM
13 years 11 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
BMCBI
2006
126views more  BMCBI 2006»
13 years 9 months ago
Effect of data normalization on fuzzy clustering of DNA microarray data
Background: Microarray technology has made it possible to simultaneously measure the expression levels of large numbers of genes in a short time. Gene expression data is informati...
Seo Young Kim, Jae Won Lee, Jong Sung Bae
ICPR
2010
IEEE
14 years 4 months ago
Canonical Patterns of Oriented Topologies
—A common problem in many areas of behavioral research is the analysis of the large volume of data recorded during the execution of the tasks being studied. Recent work has propo...
Walter Mankowski, Ali Shokoufandeh, Dario Salvucci
GLOBECOM
2009
IEEE
13 years 7 months ago
Implementation and Benchmarking of Hardware Accelerators for Ciphering in LTE Terminals
Abstract--In this paper we investigate hardware implementations of ciphering algorithms, SNOW 3G and the Advanced Encryption Standard (AES), for the acceleration of the protocol st...
Sebastian Hessel, David Szczesny, Nils Lohmann, At...
BMCBI
2006
130views more  BMCBI 2006»
13 years 9 months ago
CARMA: A platform for analyzing microarray datasets that incorporate replicate measures
Background: The incorporation of statistical models that account for experimental variability provides a necessary framework for the interpretation of microarray data. A robust ex...
Kevin A. Greer, Matthew R. McReynolds, Heddwen L. ...