A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Background: It is common for the results of a microarray study to be analyzed in the context of biologically-motivated groups of genes such as pathways or Gene Ontology categories...
Homin K. Lee, William Braynen, Kiran Keshav, Paul ...
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
A great deal of effort has gone into developing open-ended inquiry activities for science education as well as complex computer tools for accessing scientific data to help student...
Ben Loh, Josh Radinsky, Eric Russell, Louis M. Gom...
This presentation illustrates examples of my geometric sculpture and outlines certain design techniques. I apply methods from the field of computational geometry to the creation o...