Sciweavers

353 search results - page 71 / 71
» A Family of Data-Parallel Derivations
Sort
View
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
12 years 9 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
BMCBI
2010
240views more  BMCBI 2010»
13 years 6 months ago
TAM: A method for enrichment and depletion analysis of a microRNA category in a list of microRNAs
Background: MicroRNAs (miRNAs) are a class of important gene regulators. The number of identified miRNAs has been increasing dramatically in recent years. An emerging major challe...
Ming Lu, Bing Shi, Juan Wang, Qun Cao, Qinghua Cui
SIAMMA
2011
97views more  SIAMMA 2011»
12 years 8 months ago
Convergence Rates for Greedy Algorithms in Reduced Basis Methods
The reduced basis method was introduced for the accurate online evaluation of solutions to a parameter dependent family of elliptic partial differential equations. ly, it can be ...
Peter Binev, Albert Cohen, Wolfgang Dahmen, Ronald...