Sciweavers

404 search results - page 15 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
79
Voted
BMCBI
2006
122views more  BMCBI 2006»
14 years 9 months ago
A comparison of univariate and multivariate gene selection techniques for classification of cancer datasets
Background: Gene selection is an important step when building predictors of disease state based on gene expression data. Gene selection generally improves performance and identifi...
Carmen Lai, Marcel J. T. Reinders, Laura J. van't ...
JSAC
2007
112views more  JSAC 2007»
14 years 9 months ago
A Comparison of Resilient Overlay Multicast Approaches
— Overlay-based multicast has been proposed as a key alternative for large-scale group communication. There is ample motivation for such an approach, as it delivers the scalabili...
Stefan Birrer, Fabián E. Bustamante
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 4 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
15 years 1 months ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam
84
Voted
CEC
2008
IEEE
15 years 4 months ago
Policy evolution with Genetic Programming: A comparison of three approaches
— In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is now much more complex. Subt...
Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pa...