Sciweavers

111 search results - page 1 / 23
» A response to Yu et al.
Sort
View
BMCBI
2007
104views more  BMCBI 2007»
13 years 4 months ago
A response to Yu et al. "A forward-backward fragment assembling algorithm for the identification of genomic amplification and de
Background: Yu et al. (BMC Bioinformatics 2007,8: 145+) have recently compared the performance of several methods for the detection of genomic amplification and deletion breakpoin...
Oscar M. Rueda, Ramón Díaz-Uriarte
EUC
2008
Springer
13 years 6 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
CORR
2008
Springer
69views Education» more  CORR 2008»
13 years 4 months ago
Information In The Non-Stationary Case
Information estimates such as the "direct method" of Strong et al. (1998) sidestep the difficult problem of estimating the joint distribution of response and stimulus by...
Vincent Q. Vu, Bin Yu, Robert E. Kass
IJNSEC
2007
126views more  IJNSEC 2007»
13 years 4 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
EJIS
2011
118views more  EJIS 2011»
12 years 11 months ago
A response to the design-oriented information systems research memorandum
In response to O¨ sterle et al.’s ‘Memorandum on Design Oriented Information Systems Research’, this commentary disputes, and expands the context of, several premises used ...
Richard Baskerville, Kalle Lyytinen, Vallabh Samba...