Sciweavers

1802 search results - page 192 / 361
» Model-based Theory Combination
Sort
View
112
Voted
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
15 years 1 days ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
133
Voted
JCIT
2010
162views more  JCIT 2010»
14 years 9 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
JMLR
2010
105views more  JMLR 2010»
14 years 9 months ago
Evaluation of Signaling Cascades Based on the Weights from Microarray and ChIP-seq Data
In this study, we combined the ChIP-seq and the transcriptome data and integrated these data into signaling cascades. Integration was realized through a framework based on data- a...
Zerrin Isik, Volkan Atalay, Rengül Çet...
112
Voted
TWC
2010
14 years 9 months ago
A framework for statistical wireless spectrum occupancy modeling
Abstract--In this paper, we propose a novel spectrum occupancy model designed to generate accurate temporal and frequency behavior of various wireless transmissions. Our proposed w...
Chittabrata Ghosh, Srikanth Pagadarai, Dharma P. A...
191
Voted
ISBI
2011
IEEE
14 years 6 months ago
3D segmentation of rodent brain structures using Active Volume Model with shape priors
Object boundary extraction is an important task in brain image analysis. Acquiring detailed 3D representations of the brain structures could improve the detection rate of diseases...
Shaoting Zhang, Junzhou Huang, Mustafa Gökhan...