Sciweavers

2237 search results - page 95 / 448
» On the Security of Random Sources
Sort
View
BMCBI
2008
135views more  BMCBI 2008»
15 years 5 months ago
Ab-origin: an enhanced tool to identify the sourcing gene segments in germline for rearranged antibodies
Background: In the adaptive immune system, variable regions of immunoglobulin (IG) are encoded by random recombination of variable (V), diversity (D), and joining (J) gene segment...
Xiaojing Wang, Di Wu, SiYuan Zheng, Jing Sun, Lin ...
TSP
2010
14 years 11 months ago
On scalable distributed coding of correlated sources
Abstract--This paper considers the problem of scalable distributed coding of correlated sources that are communicated to a central unit, a setting typically encountered in sensor n...
Ankur Saxena, Kenneth Rose
129
Voted
OPNETEC
2004
Springer
15 years 10 months ago
Routing and Wavelength Assignment for Scheduled and Random Lightpath Demands: Bifurcated Routing versus Non-Bifurcated Routing
: We consider the routing and the wavelength assignment (RWA) of scheduled and random lightpath demands in a wavelength switching mesh network without wavelength conversion functio...
Mohamed Koubàa, Nicolas Puech, Maurice Gagn...
138
Voted
STOC
1992
ACM
100views Algorithms» more  STOC 1992»
15 years 9 months ago
Biased Random Walks
How much can an imperfect source of randomness affect an algorithm? We examine several simple questions of this type concerning the long-term behavior of a random walk on a finite...
Yossi Azar, Andrei Z. Broder, Anna R. Karlin, Nath...
154
Voted
TIT
2008
106views more  TIT 2008»
15 years 4 months ago
Byzantine Modification Detection in Multicast Networks With Random Network Coding
This paper gives an information theoretic approach for detecting Byzantine modifications in networks employing random linear network coding. Each exogenous source packet is augmen...
Tracey Ho, Ben Leong, Ralf Koetter, Muriel M&eacut...