Sciweavers

769 search results - page 147 / 154
» Where Is the Proof
Sort
View
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
BMCBI
2007
128views more  BMCBI 2007»
13 years 7 months ago
Absolute estimation of initial concentrations of amplicon in a real-time RT-PCR process
Background: Since real time PCR was first developed, several approaches to estimating the initial quantity of template in an RT-PCR reaction have been tried. While initially only ...
Marjo V. Smith, Chris R. Miller, Michael Kohn, Nig...
BMCBI
2010
110views more  BMCBI 2010»
13 years 7 months ago
GenHtr: a tool for comparative assessment of genetic heterogeneity in microbial genomes generated by massive short-read sequenci
Background: Microevolution is the study of short-term changes of alleles within a population and their effects on the phenotype of organisms. The result of the below-species-level...
GongXin Yu
CORR
2008
Springer
68views Education» more  CORR 2008»
13 years 7 months ago
Improved lower bound for deterministic broadcasting in radio networks
We consider the problem of deterministic broadcasting in radio networks when the nodes have limited knowledge about the topology of the network. We show that for every determinist...
Carlos Brito, Shailesh Vaya
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 7 months ago
Sparse Recovery by Non-convex Optimization -- Instance Optimality
In this note, we address the theoretical properties of p, a class of compressed sensing decoders that rely on p minimization with p (0, 1) to recover estimates of sparse and compr...
Rayan Saab, Özgür Yilmaz