Sciweavers

380 search results - page 41 / 76
» Time Capsule Signature
Sort
View
135
Voted
BMCBI
2008
160views more  BMCBI 2008»
15 years 2 months ago
A method for analyzing censored survival phenotype with gene expression data
Background: Survival time is an important clinical trait for many disease studies. Previous works have shown certain relationship between patients' gene expression profiles a...
Tongtong Wu, Wei Sun, Shinsheng Yuan, Chun-Houh Ch...
ECCV
2004
Springer
16 years 4 months ago
Face Recognition from Facial Surface Metric
Recently, a 3D face recognition approach based on geometric invariant signatures, has been proposed. The key idea is a representation of the facial surface, invariant to isometric ...
Alexander M. Bronstein, Michael M. Bronstein, Alon...
116
Voted
RAID
2009
Springer
15 years 9 months ago
Multi-byte Regular Expression Matching with Speculation
Intrusion prevention systems determine whether incoming traffic matches a database of signatures, where each signature in the database represents an attack or a vulnerability. IPSs...
Daniel Luchaup, Randy Smith, Cristian Estan, Somes...
116
Voted
COMSWARE
2007
IEEE
15 years 9 months ago
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further pa...
Sarang Aravamuthan, Viswanatha Rao Thumparthy
126
Voted
CCS
2007
ACM
15 years 8 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport