Sciweavers

160 search results - page 18 / 32
» Privacy-preserving data publishing: A survey of recent devel...
Sort
View
EUROMICRO
2003
IEEE
14 years 26 days ago
Extreme Programming: First Results from a Controlled Case Study
Extreme programming (XP) is the most well known agile software development method. Many experience reports have been published in recent years. Successful XP adoptions have howeve...
Pekka Abrahamsson
CCECE
2011
IEEE
12 years 7 months ago
Towards a portable, memory-efficient test system for Conducted Energy Weapons
We present a readily portable, memory-efficient performance test system (PTS) for Tasers. The proposed PTS has been developped for the most widely used Conducted Energy Weapons (...
Peyman Rahmati, David Dawson, Andy Adler
IACR
2011
209views more  IACR 2011»
12 years 7 months ago
Improved Attacks on Full GOST
GOST is a well known block cipher which was developed in the Soviet Union during the 1970’s as an alternative to the US-developed DES. In spite of considerable cryptanalytic eff...
Itai Dinur, Orr Dunkelman, Adi Shamir
BMCBI
2011
13 years 2 months ago
Shape-based peak identification for ChIP-Seq
Background: The identification of binding targets for proteins using ChIP-Seq has gained popularity as an alternative to ChIP-chip. Sequencing can, in principle, eliminate artifac...
Valerie Hower, Steven N. Evans, Lior Pachter
BMCBI
2010
148views more  BMCBI 2010»
13 years 7 months ago
Calling SNPs without a reference sequence
Background: The most common application for the next-generation sequencing technologies is resequencing, where short reads from the genome of an individual are aligned to a refere...
Aakrosh Ratan, Yu Zhang, Vanessa M. Hayes, Stephan...