Sciweavers

181 search results - page 6 / 37
» An analysis of BioHashing and its variants
Sort
View
124
Voted
TSP
2010
14 years 7 months ago
Algorithms for Complex ML ICA and Their Stability Analysis Using Wirtinger Calculus
Abstract--We derive a class of algorithms for independent component analysis (ICA) based on maximum likelihood (ML) estimation and perform stability analysis of natural gradient ML...
Hualiang Li, Tülay Adali
100
Voted
IJNSEC
2008
98views more  IJNSEC 2008»
15 years 13 days ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
114
Voted
IACR
2011
139views more  IACR 2011»
14 years 2 days ago
SGCM: The Sophie Germain Counter Mode
Abstract. Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST stan...
Markku-Juhani O. Saarinen
98
Voted
MODELS
2010
Springer
14 years 11 months ago
Modeling Features at Runtime
A feature represents a functional requirement fulfilled by a system. Since many maintenance tasks are expressed in terms of features, it is important to establish the corresponden...
Marcus Denker, Jorge Ressia, Orla Greevy, Oscar Ni...
NAR
2000
152views more  NAR 2000»
15 years 7 days ago
ASDB: database of alternatively spliced genes
Version 2.1 of ASDB (Alternative Splicing Data Base) contains 1922 protein and 2486 DNA sequences. The protein entries from SWISS-PROT are joined into clusters corresponding to al...
I. Dralyuk, Michael Brudno, Mikhail S. Gelfand, Ma...