Sciweavers

789 search results - page 158 / 158
» Modeling and Analysis of Genetic Algorithm with Tournament S...
Sort
View
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
13 years 9 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
EJC
2008
13 years 7 months ago
Center Fragments for Upscaling and Verification in Database Semantics
The notion of a fragment was coined by Montague 1974 to illustrate the formal handling of certain puzzles, such as de dicto/de re, in a truth-conditional semantics for natural lan...
Roland Hausser
BMCBI
2007
134views more  BMCBI 2007»
13 years 5 months ago
Efficient pairwise RNA structure prediction using probabilistic alignment constraints in Dynalign
Background: Joint alignment and secondary structure prediction of two RNA sequences can significantly improve the accuracy of the structural predictions. Methods addressing this p...
Arif Ozgun Harmanci, Gaurav Sharma, David H. Mathe...
BMCBI
2008
138views more  BMCBI 2008»
13 years 5 months ago
Inference of haplotypic phase and missing genotypes in polyploid organisms and variable copy number genomic regions
Background: The power of haplotype-based methods for association studies, identification of regions under selection, and ancestral inference, is well-established for diploid organ...
Shu-Yi Su, Jonathan White, David J. Balding, Lachl...