We study the two party problem of randomly selecting a string among all the strings of length n. We want the protocol to have the property that the output distribution has high en...
Harry Buhrman, Matthias Christandl, Michal Kouck&y...
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
We claim that existing specification languages for tree based grammars fail to adequately support identifier managment. We then show that XMG (eXtensible MetaGrammar) provides a s...
Background: Modeling of metabolic networks includes tasks such as network assembly, network overview, calculation of metabolic fluxes and testing the robustness of the network. Re...
Roland Schwarz, Chunguang Liang, Christoph Kaleta,...
Background: G Protein-Coupled Receptors (GPCRs) are a large and diverse family of membrane proteins whose members participate in the regulation of most cellular and physiological ...
Lucy Skrabanek, Marta Murcia, Michel Bouvier, Laks...