Sciweavers

496 search results - page 70 / 100
» Controlled Physical Random Functions
Sort
View
CORR
2007
Springer
124views Education» more  CORR 2007»
15 years 16 days ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
BMCBI
2005
189views more  BMCBI 2005»
15 years 13 days ago
Quantitative inference of dynamic regulatory pathways via microarray data
Background: The cellular signaling pathway (network) is one of the main topics of organismic investigations. The intracellular interactions between genes in a signaling pathway ar...
Wen-Chieh Chang, Chang-Wei Li, Bor-Sen Chen
JCT
2000
111views more  JCT 2000»
15 years 10 days ago
Immanants and Finite Point Processes
Givena Hermitian,non-negativede nitekernelK and a character of the symmetric group on n letters, de ne the corresponding immanant function K x1;::: ;xn := P Qn i=1 Kxi;x i, where ...
Persi Diaconis, Steven N. Evans
108
Voted
HICSS
2005
IEEE
154views Biometrics» more  HICSS 2005»
15 years 6 months ago
Market Structure and the Predictability of Electricity System Line Flows: An Experimental Analysis
Robert Thomas has shown, using simulations of experimental results, that the power flow on any line in an electric network is linearly proportional to the total system load when t...
Nodir Adilov, Thomas Light, Richard E. Schuler, Wi...
119
Voted
CCS
2010
ACM
14 years 9 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...