Sciweavers

10435 search results - page 56 / 2087
» Computational Biology and Language
Sort
View
ASM
2008
ASM
14 years 12 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
AIEDAM
2007
105views more  AIEDAM 2007»
14 years 10 months ago
Biomimetic design through natural language analysis to facilitate cross-domain information retrieval
Biomimetic, or biologically inspired, design uses analogous biological phenomena to develop solutions for engineering problems. Several instances of biomimetic design result from ...
Ivey Chiu, L. H. Shu
ECCB
2002
IEEE
15 years 2 months ago
Feature subset selection for splice site prediction
Sven Degroeve, Bernard De Baets, Yves Van de Peer,...
ECCB
2002
IEEE
15 years 2 months ago
Stochastic pairwise alignments
Ulrike Mückstein, Ivo L. Hofacker, Peter F. S...