Sciweavers

905 search results - page 140 / 181
» Public key distribution through
Sort
View
BMCBI
2007
219views more  BMCBI 2007»
13 years 8 months ago
MetaQTL: a package of new computational methods for the meta-analysis of QTL mapping experiments
Background: Integration of multiple results from Quantitative Trait Loci (QTL) studies is a key point to understand the genetic determinism of complex traits. Up to now many effor...
Jean-Baptiste Veyrieras, Bruno Goffinet, Alain Cha...
DEBU
2008
149views more  DEBU 2008»
13 years 8 months ago
Semantics enhanced Services: METEOR-S, SAWSDL and SA-REST
Services Research Lab at the Knoesis center and the LSDIS lab at University of Georgia have played a significant role in advancing the state of research in the areas of workflow m...
Amit P. Sheth, Karthik Gomadam, Ajith Ranabahu
JCB
2002
87views more  JCB 2002»
13 years 8 months ago
The Repetitive Sequence Database and Mining Putative Regulatory Elements in Gene Promoter Regions
At least 43% of the human genome is occupied by repetitive elements. Moreover, around 51% of the rice genome is occupied by repetitive elements. The analysis of repetitive element...
Jorng-Tzong Horng, Hsien-Da Huang, Ming-Hui Jin, L...
CORR
2011
Springer
143views Education» more  CORR 2011»
13 years 13 days ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
ACSAC
2010
IEEE
13 years 9 days ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo