Sciweavers

667 search results - page 61 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
DIM
2007
ACM
15 years 3 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
BMCBI
2007
157views more  BMCBI 2007»
14 years 12 months ago
Improving gene set analysis of microarray data by SAM-GS
Background: Gene-set analysis evaluates the expression of biological pathways, or a priori defined gene sets, rather than that of individual genes, in association with a binary ph...
Irina Dinu, John D. Potter, Thomas Mueller, Qi Liu...
JCB
2000
103views more  JCB 2000»
14 years 11 months ago
Testing for Differentially-Expressed Genes by Maximum-Likelihood Analysis of Microarray Data
Although two-color uorescent DNA microarrays are now standard equipment in many molecular biology laboratories, methods for identifying differentially expressed genes in microarra...
Trey Ideker, Vesteinn Thorsson, Andrew F. Siegel, ...
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
15 years 6 months ago
Vigilance and Error Detection in an Automated Command and Control Environment
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
David P. Biros, Kent Marett, Brent T. Langhals
BMCBI
2006
152views more  BMCBI 2006»
14 years 12 months ago
Predicting deleterious nsSNPs: an analysis of sequence and structural attributes
Background: There has been an explosion in the number of single nucleotide polymorphisms (SNPs) within public databases. In this study we focused on non-synonymous protein coding ...
Richard J. B. Dobson, Patricia B. Munroe, Mark J. ...