Sciweavers

3092 search results - page 524 / 619
» Where are you pointing
Sort
View
CCS
2010
ACM
13 years 9 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
SIGCOMM
2010
ACM
13 years 9 months ago
The case for active device drivers
We revisit the device-driver architecture supported by the majority of operating systems, where a driver is a passive object that does not have its own thread of control and is on...
Leonid Ryzhyk, Yanjin Zhu, Gernot Heiser
BMCBI
2010
103views more  BMCBI 2010»
13 years 9 months ago
A method of predicting changes in human gene splicing induced by genetic variants in context of cis-acting elements
Background: Polymorphic variants and mutations disrupting canonical splicing isoforms are among the leading causes of human hereditary disorders. While there is a substantial evid...
Alexander G. Churbanov, Igor Vorechovsky, Chindo H...
BMCBI
2008
128views more  BMCBI 2008»
13 years 9 months ago
Nonparametric relevance-shifted multiple testing procedures for the analysis of high-dimensional multivariate data with small sa
Background: In many research areas it is necessary to find differences between treatment groups with several variables. For example, studies of microarray data seek to find a sign...
Cornelia Frömke, Ludwig A. Hothorn, Siegfried...
BMCBI
2008
127views more  BMCBI 2008»
13 years 9 months ago
Human Pol II promoter recognition based on primary sequences and free energy of dinucleotides
Background: Promoter region plays an important role in determining where the transcription of a particular gene should be initiated. Computational prediction of eukaryotic Pol II ...
Jian-Yi Yang, Yu Zhou, Zu-Guo Yu, Vo Anh, Li-Qian ...