Sciweavers

2949 search results - page 339 / 590
» Universal Sparse Modeling
Sort
View
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 6 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
139
Voted
BMCBI
2004
185views more  BMCBI 2004»
15 years 2 months ago
Linear fuzzy gene network models obtained from microarray data by exhaustive search
Background: Recent technological advances in high-throughput data collection allow for experimental study of increasingly complex systems on the scale of the whole cellular genome...
Bahrad A. Sokhansanj, J. Patrick Fitch, Judy N. Qu...
112
Voted
IM
2003
15 years 4 months ago
Generic On-Line Discovery of Quantitative Models for Service Level Management
: Quantitative models are needed for a variety of management tasks, including (a) identification of critical variables to use for health monitoring, (b) anticipating service level...
Yixin Diao, Frank Eskesen, Steve Froehlich, Joseph...
148
Voted
SENSYS
2010
ACM
15 years 14 days ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....
116
Voted
EMSOFT
2008
Springer
15 years 4 months ago
Automatically transforming and relating Uppaal models of embedded systems
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
Timothy Bourke, Arcot Sowmya