Sciweavers

616 search results - page 39 / 124
» Forecasting presence and availability
Sort
View
BMCBI
2010
176views more  BMCBI 2010»
14 years 9 months ago
TargetSpy: a supervised machine learning approach for microRNA target prediction
Background: Virtually all currently available microRNA target site prediction algorithms require the presence of a (conserved) seed match to the 5' end of the microRNA. Recen...
Martin Sturm, Michael Hackenberg, David Langenberg...
HICSS
1995
IEEE
128views Biometrics» more  HICSS 1995»
15 years 1 months ago
Instruction Level Parallelism
Abstract. We reexamine the limits of parallelism available in programs, using runtime reconstruction of program data-flow graphs. While limits of parallelism have been examined in...
CCS
2007
ACM
15 years 3 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
ISLPED
2006
ACM
74views Hardware» more  ISLPED 2006»
15 years 3 months ago
Power phase variation in a commercial server workload
Many techniques have been developed for adaptive power management of computing systems. These techniques rely on the presence of varying power phases to detect opportunities for a...
W. L. Bircher, L. K. John
MEDIAFORENSICS
2010
14 years 11 months ago
Sensor noise camera identification: countering counter-forensics
In camera identification using sensor noise, the camera that took a given image can be determined with high certainty by establishing the presence of the camera's sensor fing...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen