Sciweavers

634 search results - page 127 / 127
» Completion Procedures as Semidecision Procedures
Sort
View
CCS
2010
ACM
13 years 3 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
BMCBI
2011
13 years 1 months ago
GCOD - GeneChip Oncology Database
Background: DNA microarrays have become a nearly ubiquitous tool for the study of human disease, and nowhere is this more true than in cancer. With hundreds of studies and thousan...
Fenglong Liu, Joseph White, Corina Antonescu, John...
BMCBI
2011
13 years 1 months ago
nocoRNAc: Characterization of non-coding RNAs in prokaryotes
Background: The interest in non-coding RNAs (ncRNAs) constantly rose during the past few years because of the wide spectrum of biological processes in which they are involved. Thi...
Alexander Herbig, Kay Nieselt
CHI
2011
ACM
12 years 9 months ago
When designing usability questionnaires, does it hurt to be positive?
When designing questionnaires there is a tradition of including items with both positive and negative wording to minimize acquiescence and extreme response biases. Two disadvantag...
Jeff Sauro, James R. Lewis