Sciweavers

3143 search results - page 266 / 629
» Minimization of entropy functionals
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 8 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
CRYPTO
2006
Springer
111views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
We address the message authentication problem in two seemingly different communication models. In the first model, the sender and receiver are connected by an insecure channel and...
Moni Naor, Gil Segev, Adam Smith
ESANN
2004
15 years 6 months ago
Forbidden magnification? II
The twin of this paper, "Forbidden Magnification? I." [1], presents systematic SOM simulations with the explicit magnification control scheme of Bauer, Der, and Herrmann ...
Erzsébet Merényi, Abha Jain
BMCBI
2010
98views more  BMCBI 2010»
15 years 4 months ago
Prediction of protein structural classes for low-homology sequences based on predicted secondary structure
Background: Prediction of protein structural classes (a, b, a + b and a/b) from amino acid sequences is of great importance, as it is beneficial to study protein function, regulat...
Jian-Yi Yang, Zhen-Ling Peng, Xin Chen
BMCBI
2007
120views more  BMCBI 2007»
15 years 4 months ago
Phylo-mLogo: an interactive and hierarchical multiple-logo visualization tool for alignment of many sequences
Background: When aligning several hundreds or thousands of sequences, such as epidemic virus sequences or homologous/orthologous sequences of some big gene families, to reconstruc...
Arthur Chun-Chieh Shih, D. T. Lee, Chin-Lin Peng, ...