Sciweavers

488 search results - page 95 / 98
» Point labeling with sliding labels
Sort
View
CCS
2010
ACM
13 years 8 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
BMCBI
2010
110views more  BMCBI 2010»
13 years 8 months ago
Towards the systematic discovery of signal transduction networks using phosphorylation dynamics data
Background: Phosphorylation is a ubiquitous and fundamental regulatory mechanism that controls signal transduction in living cells. The number of identified phosphoproteins and th...
Haruna Imamura, Nozomu Yachie, Rintaro Saito, Yasu...
ENTCS
2008
146views more  ENTCS 2008»
13 years 8 months ago
Probabilistic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions
istic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions Michael J. A. Smith1 ,2 Laboratory for Foundations of Computer Science University of Edinb...
Michael J. A. Smith
BMCBI
2006
182views more  BMCBI 2006»
13 years 8 months ago
AceTree: a tool for visual analysis of Caenorhabditis elegans embryogenesis
Background: The invariant lineage of the nematode Caenorhabditis elegans has potential as a powerful tool for the description of mutant phenotypes and gene expression patterns. We...
Thomas J. Boyle, Zhirong Bao, John I. Murray, Carl...
CVIU
2007
146views more  CVIU 2007»
13 years 8 months ago
Face detection in gray scale images using locally linear embeddings
The problem of face detection remains challenging because faces are non-rigid objects that have a high degree of variability with respect to head rotation, illumination, facial ex...
Samuel Kadoury, Martin D. Levine