Sciweavers

11 search results - page 2 / 3
» Block transitivity and degree matrices
Sort
View
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
13 years 8 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
WAW
2007
Springer
157views Algorithms» more  WAW 2007»
13 years 11 months ago
Stochastic Kronecker Graphs
A random graph model based on Kronecker products of probability matrices has been recently proposed as a generative model for large-scale real-world networks such as the web. This...
Mohammad Mahdian, Ying Xu 0002
BMCBI
2005
100views more  BMCBI 2005»
13 years 4 months ago
Evolutionary models for insertions and deletions in a probabilistic modeling framework
Background: Probabilistic models for sequence comparison (such as hidden Markov models and pair hidden Markov models for proteins and mRNAs, or their context-free grammar counterp...
Elena Rivas
CORR
2008
Springer
139views Education» more  CORR 2008»
13 years 4 months ago
Exact two-terminal reliability of some directed networks
Abstract-- The calculation of network reliability in a probabilistic context has long been an issue of practical and academic importance. Conventional approaches (determination of ...
Christian Tanguy
VIS
2004
IEEE
156views Visualization» more  VIS 2004»
14 years 6 months ago
Force-Feedback-Enhanced Navigation for Interactive Visualization of Coronary Vessels
Coronary heart disease (CHD) is the number one killer in the United States. Although it is well known that CHD mainly occurs due to blocked arteries, there are contradictory resul...
Thomas Wischgoll, Elke Moritz, Jörg Meyer