Sciweavers

653 search results - page 97 / 131
» Using common random numbers for indifference-zone selection
Sort
View
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 3 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
BMCBI
2010
152views more  BMCBI 2010»
13 years 9 months ago
Comparative study of discretization methods of microarray data for inferring transcriptional regulatory networks
Background: Microarray data discretization is a basic preprocess for many algorithms of gene regulatory network inference. Some common discretization methods in informatics are us...
Yong Li, Lili Liu, Xi Bai, Hua Cai, Wei Ji, Dianji...
CORR
2012
Springer
237views Education» more  CORR 2012»
12 years 4 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...
BMCBI
2004
132views more  BMCBI 2004»
13 years 8 months ago
Two-stage normalization using background intensities in cDNA microarray data
Background: In the microarray experiment, many undesirable systematic variations are commonly observed. Normalization is the process of removing such variation that affects the me...
Dankyu Yoon, Sung-Gon Yi, Ju-Han Kim, Taesung Park
APPROX
2008
Springer
101views Algorithms» more  APPROX 2008»
13 years 10 months ago
Streaming Algorithms for k-Center Clustering with Outliers and with Anonymity
Clustering is a common problem in the analysis of large data sets. Streaming algorithms, which make a single pass over the data set using small working memory and produce a cluster...
Richard Matthew McCutchen, Samir Khuller