Sciweavers

905 search results - page 140 / 181
» Public key distribution through
Sort
View
BMCBI
2007
219views more  BMCBI 2007»
15 years 1 hour ago
MetaQTL: a package of new computational methods for the meta-analysis of QTL mapping experiments
Background: Integration of multiple results from Quantitative Trait Loci (QTL) studies is a key point to understand the genetic determinism of complex traits. Up to now many effor...
Jean-Baptiste Veyrieras, Bruno Goffinet, Alain Cha...
DEBU
2008
149views more  DEBU 2008»
14 years 12 months ago
Semantics enhanced Services: METEOR-S, SAWSDL and SA-REST
Services Research Lab at the Knoesis center and the LSDIS lab at University of Georgia have played a significant role in advancing the state of research in the areas of workflow m...
Amit P. Sheth, Karthik Gomadam, Ajith Ranabahu
JCB
2002
87views more  JCB 2002»
14 years 11 months ago
The Repetitive Sequence Database and Mining Putative Regulatory Elements in Gene Promoter Regions
At least 43% of the human genome is occupied by repetitive elements. Moreover, around 51% of the rice genome is occupied by repetitive elements. The analysis of repetitive element...
Jorng-Tzong Horng, Hsien-Da Huang, Ming-Hui Jin, L...
CORR
2011
Springer
143views Education» more  CORR 2011»
14 years 3 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
ACSAC
2010
IEEE
14 years 3 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo