Sciweavers

155 search results - page 27 / 31
» Theoretical and empirical results for recovery from multiple...
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 1 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
BMCBI
2004
177views more  BMCBI 2004»
13 years 7 months ago
Gapped alignment of protein sequence motifs through Monte Carlo optimization of a hidden Markov model
Background: Certain protein families are highly conserved across distantly related organisms and belong to large and functionally diverse superfamilies. The patterns of conservati...
Andrew F. Neuwald, Jun S. Liu
SQJ
2002
110views more  SQJ 2002»
13 years 7 months ago
A General Model of Unit Testing Efficacy
Much of software engineering is targeted towards identifying and removing existing defects while preventing the injection of new ones. Defect management is therefore one important ...
Houman Younessi, Panlop Zeephongsekul, Winai Bodhi...
BMCBI
2008
173views more  BMCBI 2008»
13 years 7 months ago
Gene Vector Analysis (Geneva): A unified method to detect differentially-regulated gene sets and similar microarray experiments
Background: Microarray experiments measure changes in the expression of thousands of genes. The resulting lists of genes with changes in expression are then searched for biologica...
Stephen W. Tanner, Pankaj Agarwal
SDM
2007
SIAM
177views Data Mining» more  SDM 2007»
13 years 8 months ago
Multi-way Clustering on Relation Graphs
A number of real-world domains such as social networks and e-commerce involve heterogeneous data that describes relations between multiple classes of entities. Understanding the n...
Arindam Banerjee, Sugato Basu, Srujana Merugu