Sciweavers

404 search results - page 15 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
130
Voted
BMCBI
2006
122views more  BMCBI 2006»
15 years 3 months ago
A comparison of univariate and multivariate gene selection techniques for classification of cancer datasets
Background: Gene selection is an important step when building predictors of disease state based on gene expression data. Gene selection generally improves performance and identifi...
Carmen Lai, Marcel J. T. Reinders, Laura J. van't ...
120
Voted
JSAC
2007
112views more  JSAC 2007»
15 years 3 months ago
A Comparison of Resilient Overlay Multicast Approaches
— Overlay-based multicast has been proposed as a key alternative for large-scale group communication. There is ample motivation for such an approach, as it delivers the scalabili...
Stefan Birrer, Fabián E. Bustamante
169
Voted
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 10 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
137
Voted
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
15 years 7 months ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam
132
Voted
CEC
2008
IEEE
15 years 10 months ago
Policy evolution with Genetic Programming: A comparison of three approaches
— In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is now much more complex. Subt...
Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pa...