Sciweavers

3996 search results - page 740 / 800
» A Publish
Sort
View
JUCS
2008
156views more  JUCS 2008»
14 years 11 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JDFP
2006
139views more  JDFP 2006»
14 years 11 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
KER
2008
107views more  KER 2008»
14 years 11 months ago
Tuplespace-based computing for the Semantic Web: a survey of the state-of-the-art
Semantic technologies promise to solve many challenging problems of the present Web applications. As they achieve a feasible level of maturity, they become increasingly accepted i...
Lyndon J. B. Nixon, Elena Paslaru Bontas Simperl, ...
JIB
2006
78views more  JIB 2006»
14 years 11 months ago
Prediction of transcription factor binding to DNA using rule induction methods
In this study, we seek to develop a predictive model for finding the strength of binding between a particular transcription factor (TF) variant and a particular DNA target variant...
Mikael Huss, Karin Nordström
KES
2008
Springer
14 years 11 months ago
Downsizing Multigenic Predictors of the Response to Preoperative Chemotherapy in Breast Cancer
We present a method for designing efficient multigenic predictors with few probes and its application to the prediction of the response to preoperative chemotherapy in breast cance...
René Natowicz, Roberto Incitti, Roman Rouzi...