Sciweavers

1997 search results - page 331 / 400
» A Model for Data Leakage Detection
Sort
View
AMAST
2008
Springer
15 years 1 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
BIOINFORMATICS
2010
170views more  BIOINFORMATICS 2010»
14 years 12 months ago
Joint estimation of DNA copy number from multiple platforms
DNA copy number variants (CNV) are gains and losses of segments of chromosomes, and comprise an important class of genetic variation. Recently, various microarray hybridization ba...
Nancy R. Zhang, Yasin Senbabaoglu, Jun Z. Li
BMCBI
2010
158views more  BMCBI 2010»
14 years 12 months ago
Validation of differential gene expression algorithms: Application comparing fold-change estimation to hypothesis testing
Background: Sustained research on the problem of determining which genes are differentially expressed on the basis of microarray data has yielded a plethora of statistical algorit...
Corey M. Yanofsky, David R. Bickel
TSP
2008
132views more  TSP 2008»
14 years 10 months ago
On Doubly Selective Channel Estimation Using Superimposed Training and Discrete Prolate Spheroidal Sequences
Abstract--Channel estimation and data detection for frequencyselective time-varying channels are considered using superimposed training. We employ a discrete prolate spheroidal bas...
Shuangchi He, Jitendra K. Tugnait
ETRA
2008
ACM
235views Biometrics» more  ETRA 2008»
15 years 1 months ago
Using semantic content as cues for better scanpath prediction
Under natural viewing conditions, human observers use shifts in gaze to allocate processing resources to subsets of the visual input. There are many computational models that try ...
Moran Cerf, E. Paxon Frady, Christof Koch