Sciweavers

657 search results - page 56 / 132
» Assessment of E-Business Transformation Using Simulation Mod...
Sort
View
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
15 years 3 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...
LWA
2007
14 years 11 months ago
Taking the Teacher's Perspective for User Modeling in Complex Domains
Serious games that should adapt training to the individual might benefit from methods that are developed for intelligent tutoring systems. One method, model tracing, might be used...
Christian P. Janssen, Hedderik van Rijn
BMCBI
2010
176views more  BMCBI 2010»
14 years 9 months ago
Reverse engineering gene regulatory network from microarray data using linear time-variant model
nd: Gene regulatory network is an abstract mapping of gene regulations in living cells that can help to predict the system behavior of living organisms. Such prediction capability...
Mitra Kabir, Nasimul Noman, Hitoshi Iba
HPDC
2010
IEEE
14 years 10 months ago
A hybrid Markov chain model for workload on parallel computers
This paper proposes a comprehensive modeling architecture for workloads on parallel computers using Markov chains in combination with state dependent empirical distribution functi...
Anne Krampe, Joachim Lepping, Wiebke Sieben
BMCBI
2010
140views more  BMCBI 2010»
14 years 9 months ago
Quantification and deconvolution of asymmetric LC-MS peaks using the bi-Gaussian mixture model and statistical model selection
Background: Liquid chromatography-mass spectrometry (LC-MS) is one of the major techniques for the quantification of metabolites in complex biological samples. Peak modeling is on...
Tianwei Yu, Hesen Peng