Sciweavers

IJNSEC
2008
106views more  IJNSEC 2008»
13 years 4 months ago
Comments on "Improved Efficient Remote User Authentication Schemes"
Recently, Tian et al. presented an article, in which they discussed some security weaknesses of Yoon et al.'s scheme and subsequently proposed two "improved" scheme...
Manik Lal Das
IIE
2008
74views more  IIE 2008»
13 years 4 months ago
The First Decade of Informatics in Dutch High Schools
Abstract. Informatics is currently being taught in high schools all over the world. In the Netherlands, where all students are expected to become computer literate in the lower gra...
Natasa Grgurina, Jos Tolboom
COMPSEC
2006
94views more  COMPSEC 2006»
13 years 4 months ago
A novel remote user authentication scheme using bilinear pairings
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.'s scheme and mad...
Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati...
IEE
2008
116views more  IEE 2008»
13 years 4 months ago
Evaluating formal properties of feature diagram languages
: Feature diagrams (FDs) are a family of popular modelling languages, mainly used for managing variability in software product lines. FDs were first introduced by Kang et al. as pa...
Patrick Heymans, Pierre-Yves Schobbens, Jean-Chris...
BMCBI
2006
114views more  BMCBI 2006»
13 years 4 months ago
A direct comparison of protein interaction confidence assignment schemes
Background: Recent technological advances have enabled high-throughput measurements of protein-protein interactions in the cell, producing large protein interaction networks for v...
Silpa Suthram, Tomer Shlomi, Eytan Ruppin, Roded S...
EJC
2008
13 years 4 months ago
Fractional coloring and the odd Hadwiger's conjecture
Gerards and Seymour (see [T.R. Jensen, B. Toft, Graph Coloring Problems, Wiley-Interscience, 1995], page 115) conjectured that if a graph has no odd complete minor of order p, the...
Ken-ichi Kawarabayashi, Bruce A. Reed
ENDM
2010
136views more  ENDM 2010»
13 years 4 months ago
Approximating the asymmetric profitable tour
Abstract We study the version of the asymmetric prize collecting traveling salesman problem, where the objective is to find a directed tour that visits a subset of vertices such th...
Viet Hung Nguyen, Thi Thu Thuy Nguyen
BMCBI
2008
132views more  BMCBI 2008»
13 years 4 months ago
The SeqWord Genome Browser: an online tool for the identification and visualization of atypical regions of bacterial genomes thr
Background: Data mining in large DNA sequences is a major challenge in microbial genomics and bioinformatics. Oligonucleotide usage (OU) patterns provide a wealth of information f...
Hamilton Ganesan, Anna S. Rakitianskaia, Colin F. ...
BMCBI
2007
156views more  BMCBI 2007»
13 years 4 months ago
Bio: : NEXUS: a Perl API for the NEXUS format for comparative biological data
Background: Evolutionary analysis provides a formal framework for comparative analysis of genomic and other data. In evolutionary analysis, observed data are treated as the termin...
Thomas Hladish, Vivek Gopalan, Chengzhi Liang, Wei...
BMCBI
2007
114views more  BMCBI 2007»
13 years 4 months ago
Large scale statistical inference of signaling pathways from RNAi and microarray data
Background: The advent of RNA interference techniques enables the selective silencing of biologically interesting genes in an efficient way. In combination with DNA microarray tec...
Holger Fröhlich, Mark Fellmann, Holger Sü...