Sciweavers

1804 search results - page 288 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
BMCBI
2010
136views more  BMCBI 2010»
13 years 9 months ago
An integrated Bayesian analysis of LOH and copy number data
Background: Cancer and other disorders are due to genomic lesions. SNP-microarrays are able to measure simultaneously both genotype and copy number (CN) at several Single Nucleoti...
Paola M. V. Rancoita, Marcus Hutter, Francesco Ber...
BMCBI
2006
145views more  BMCBI 2006»
13 years 9 months ago
GEM System: automatic prototyping of cell-wide metabolic pathway models from genomes
Background: Successful realization of a "systems biology" approach to analyzing cells is a grand challenge for our understanding of life. However, current modeling appro...
Kazuharu Arakawa, Yohei Yamada, Kosaku Shinoda, Yo...
SIAMCOMP
2010
83views more  SIAMCOMP 2010»
13 years 7 months ago
Reaching and Distinguishing States of Distributed Systems
Some systems interact with their environment at physically distributed interfaces, called ports, and in testing such a system it is normal to place a tester at each port. Each test...
Robert M. Hierons
FGR
2008
IEEE
229views Biometrics» more  FGR 2008»
14 years 3 months ago
A high-resolution 3D dynamic facial expression database
Face information processing relies on the quality of data resource. From the data modality point of view, a face database can be 2D or 3D, and static or dynamic. From the task poi...
Lijun Yin, Xiaochen Chen, Yi Sun, Tony Worm, Micha...