Sciweavers

1173 search results - page 190 / 235
» Program Derivation Using Analogy
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 2 months ago
Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols
ion for Epistemic Model Checking of Dining Cryptographers-based Protocols Omar I. Al-Bataineh and Ron van der Meyden School of Computer Science and Engineering, University of New S...
Omar I. Al-Bataineh, Ron van der Meyden
117
Voted
IJNSEC
2006
94views more  IJNSEC 2006»
15 years 2 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 2 months ago
Information-theoretic limits on sparsity recovery in the high-dimensional and noisy setting
The problem of recovering the sparsity pattern of a fixed but unknown vector β∗ ∈ Rp based on a set of n noisy observations arises in a variety of settings, including subset...
Martin J. Wainwright
NAR
2006
88views more  NAR 2006»
15 years 2 months ago
PupaSuite: finding functional single nucleotide polymorphisms for large-scale genotyping purposes
We have developed a web tool, PupaSuite, for the selection of single nucleotide polymorphisms (SNPs) with potential phenotypic effect, specifically oriented to help in the design ...
Lucía Conde, Juan M. Vaquerizas, Hern&aacut...
119
Voted
INFORMATICALT
2007
106views more  INFORMATICALT 2007»
15 years 2 months ago
Framework for Choosing a Set of Syllables and Phonemes for Lithuanian Speech Recognition
This paper describes a framework for making up a set of syllables and phonemes that subsequently is used in the creation of acoustic models for continuous speech recognition of Lit...
Sigita Laurinciukaite, Antanas Lipeika