Sciweavers

472 search results - page 91 / 95
» Limiting Negations in Formulas
Sort
View
ESORICS
2010
Springer
15 years 22 days ago
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
Sambuddho Chakravarty, Angelos Stavrou, Angelos D....
MOBICOM
2010
ACM
14 years 12 months ago
ZiFi: wireless LAN discovery via ZigBee interference signatures
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectiv...
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin S...
BMCBI
2010
136views more  BMCBI 2010»
14 years 11 months ago
The IronChip evaluation package: a package of perl modules for robust analysis of custom microarrays
Background: Gene expression studies greatly contribute to our understanding of complex relationships in gene regulatory networks. However, the complexity of array design, producti...
Yevhen Vainshtein, Mayka Sanchez, Alvis Brazma, Ma...
BMCBI
2007
99views more  BMCBI 2007»
14 years 11 months ago
Orthogonal projections to latent structures as a strategy for microarray data normalization
Background: During generation of microarray data, various forms of systematic biases are frequently introduced which limits accuracy and precision of the results. In order to prop...
Max Bylesjö, Daniel Eriksson, Andreas Sjö...
BMCBI
2007
160views more  BMCBI 2007»
14 years 11 months ago
Identifying protein complexes directly from high-throughput TAP data with Markov random fields
Background: Predicting protein complexes from experimental data remains a challenge due to limited resolution and stochastic errors of high-throughput methods. Current algorithms ...
Wasinee Rungsarityotin, Roland Krause, Arno Sch&ou...