Sciweavers

5344 search results - page 1037 / 1069
» Privacy-Preserving Set Operations
Sort
View
IANDC
2008
105views more  IANDC 2008»
13 years 10 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
BMCBI
2006
120views more  BMCBI 2006»
13 years 10 months ago
The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy
Background: In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. ...
Arnim Jenett, Johannes E. Schindelin, Martin Heise...
BMCBI
2006
147views more  BMCBI 2006»
13 years 10 months ago
The NeuARt II system: a viewing tool for neuroanatomical data based on published neuroanatomical atlases
Background: Anatomical studies of neural circuitry describing the basic wiring diagram of the brain produce intrinsically spatial, highly complex data of great value to the neuros...
Gully A. P. C. Burns, Wei-Cheng Cheng, Richard H. ...
BMCBI
2006
143views more  BMCBI 2006»
13 years 10 months ago
Fast estimation of the difference between two PAM/JTT evolutionary distances in triplets of homologous sequences
Background: The estimation of the difference between two evolutionary distances within a triplet of homologs is a common operation that is used for example to determine which of t...
Christophe Dessimoz, Manuel Gil, Adrian Schneider,...
CCR
2006
76views more  CCR 2006»
13 years 10 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
« Prev « First page 1037 / 1069 Last » Next »