Sciweavers

1789 search results - page 142 / 358
» New analysis and results for the Frank-Wolfe method
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 5 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
BMCBI
2008
120views more  BMCBI 2008»
15 years 1 months ago
Statistical issues in the analysis of Illumina data
Background: Illumina bead-based arrays are becoming increasingly popular due to their high degree of replication and reported high data quality. However, little attention has been...
Mark J. Dunning, Nuno L. Barbosa-Morais, Andy G. L...
BMCBI
2010
97views more  BMCBI 2010»
15 years 1 months ago
Kinome-wide interaction modelling using alignment-based and alignment-independent approaches for kinase description and linear a
Background: Protein kinases play crucial roles in cell growth, differentiation, and apoptosis. Abnormal function of protein kinases can lead to many serious diseases, such as canc...
Maris Lapinsh, Jarl E. S. Wikberg
TSE
1998
83views more  TSE 1998»
15 years 1 months ago
Cost-Effective Analysis of In-Place Software Processes
—Process studies and improvement efforts typically call for new instrumentation on the process in order to collect the data they have deemed necessary. This can be intrusive and ...
Jonathan E. Cook, Lawrence G. Votta, Alexander L. ...
TCBB
2011
14 years 8 months ago
Data Mining on DNA Sequences of Hepatitis B Virus
: Extraction of meaningful information from large experimental datasets is a key element of bioinformatics research. One of the challenges is to identify genomic markers in Hepatit...
Kwong-Sak Leung, Kin-Hong Lee, Jin Feng Wang, Eddi...