Sciweavers

134 search results - page 14 / 27
» The First Experimental Cryptanalysis of the Data Encryption ...
Sort
View
CCS
2009
ACM
14 years 2 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
EC
1998
112views ECommerce» more  EC 1998»
13 years 7 months ago
DNA Computation: Theory, Practice, and Prospects
L. M. Adleman launched the field of DNA computing with a demonstration in 1994 that strands of DNA could be used to solve the Hamiltonian path problem for a simple graph. He also...
Carlo C. Maley
BMCBI
2007
115views more  BMCBI 2007»
13 years 7 months ago
A novel, fast, HMM-with-Duration implementation - for application with a new, pattern recognition informed, nanopore detector
Background: Hidden Markov Models (HMMs) provide an excellent means for structure identification and feature extraction on stochastic sequential data. An HMM-with-Duration (HMMwD) ...
Stephen Winters-Hilt, Carl Baribault
BMCBI
2007
113views more  BMCBI 2007»
13 years 7 months ago
Statistical tools for transgene copy number estimation based on real-time PCR
Background: As compared with traditional transgene copy number detection technologies such as Southern blot analysis, real-time PCR provides a fast, inexpensive and high-throughpu...
Joshua S. Yuan, Jason N. Burris, Nathan R. Stewart...
KDD
2004
ACM
164views Data Mining» more  KDD 2004»
14 years 7 months ago
Ordering patterns by combining opinions from multiple sources
Pattern ordering is an important task in data mining because the number of patterns extracted by standard data mining algorithms often exceeds our capacity to manually analyze the...
Pang-Ning Tan, Rong Jin