Sciweavers

390 search results - page 74 / 78
» Japanese Dependency Analysis Using the Ancestor-Descendant R...
Sort
View
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 23 days ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
BMCBI
2010
130views more  BMCBI 2010»
13 years 7 months ago
The behaviour of random forest permutation-based variable importance measures under predictor correlation
Background: Random forests (RF) have been increasingly used in applications such as genome-wide association and microarray studies where predictor correlation is frequently observ...
Kristin K. Nicodemus, James D. Malley, Carolin Str...
BMCBI
2006
116views more  BMCBI 2006»
13 years 7 months ago
Gene annotation and network inference by phylogenetic profiling
Background: Phylogenetic analysis is emerging as one of the most informative computational methods for the annotation of genes and identification of evolutionary modules of functi...
Jie Wu, Zhenjun Hu, Charles DeLisi
BMCBI
2006
108views more  BMCBI 2006»
13 years 7 months ago
Probe set algorithms: is there a rational best bet?
Affymetrix microarrays have become a standard experimental platform for studies of mRNA expression profiling. Their success is due, in part, to the multiple oligonucleotide featur...
Jinwook Seo, Eric P. Hoffman
JFP
2007
111views more  JFP 2007»
13 years 7 months ago
Mechanizing metatheory in a logical framework
The LF logical framework codifies a methodology for representing deductive systems, such as programming languages and logics, within a dependently typed λ-calculus. In this meth...
Robert Harper, Daniel R. Licata