Sciweavers

18306 search results - page 3366 / 3662
» Algorithmics in Exponential Time
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
15 years 3 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CGF
2008
201views more  CGF 2008»
15 years 3 months ago
Fluid in Video: Augmenting Real Video with Simulated Fluids
We present a technique for coupling simulated fluid phenomena that interact with real dynamic scenes captured as a binocular video sequence. We first process the binocular video s...
Vivek Kwatra, Philippos Mordohai, Rahul Narain, Sa...
DC
2008
15 years 3 months ago
Fast computation by population protocols with a leader
Fast algorithms are presented for performing computations in a probabilistic population model. This is a variant of the standard population protocol model--in which finite-state ag...
Dana Angluin, James Aspnes, David Eisenstat
BIOINFORMATICS
2006
142views more  BIOINFORMATICS 2006»
15 years 3 months ago
Intervention in a family of Boolean networks
Motivation: Intervention in a gene regulatory network is used to avoid undesirable states, such as those associated with a disease. Several types of intervention have been studied...
Ashish Choudhary, Aniruddha Datta, Michael L. Bitt...
BMCBI
2006
118views more  BMCBI 2006»
15 years 3 months ago
Microarray image analysis: background estimation using quantile and morphological filters
Background: In a microarray experiment the difference in expression between genes on the same slide is up to 103 fold or more. At low expression, even a small error in the estimat...
Anders Bengtsson, Henrik Bengtsson
« Prev « First page 3366 / 3662 Last » Next »