Sciweavers

455 search results - page 40 / 91
» Differential Privacy in New Settings
Sort
View
CAV
2009
Springer
132views Hardware» more  CAV 2009»
15 years 10 months ago
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion
This paper is concerned with the problem of computing the image of a set by a polynomial function. Such image computations constitute a crucial component in typical tools for set-b...
Thao Dang, David Salinas
IJBRA
2006
59views more  IJBRA 2006»
14 years 9 months ago
Predicting altered pathways using extendable scaffolds
: Many diseases, especially solid tumors, involve the disruption or deregulation of cellular processes. Most current work using gene expression and other high-throughput data, simp...
B. M. Broom, T. J. McDonnell, D. Subramanian
ACSAC
2006
IEEE
15 years 3 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
FUIN
2011
358views Cryptology» more  FUIN 2011»
14 years 1 months ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
ESORICS
2009
Springer
15 years 10 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...