Sciweavers

1626 search results - page 197 / 326
» Subtyping with Power Types
Sort
View
144
Voted
ASIACRYPT
2008
Springer
15 years 6 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas
132
Voted
BMCBI
2008
95views more  BMCBI 2008»
15 years 5 months ago
Gene set analyses for interpreting microarray experiments on prokaryotic organisms
Background: Despite the widespread usage of DNA microarrays, questions remain about how best to interpret the wealth of gene-by-gene transcriptional levels that they measure. Rece...
Nathan L. Tintle, Aaron A. Best, Matthew DeJongh, ...
CSDA
2008
102views more  CSDA 2008»
15 years 5 months ago
Step-up and step-down procedures controlling the number and proportion of false positives
In multiple hypotheses testing, it is important to control the probability of rejecting "true" null hypotheses. A standard procedure has been to control the family-wise ...
Paul N. Somerville, Claudia Hemmelmann
131
Voted
DATAMINE
2008
137views more  DATAMINE 2008»
15 years 5 months ago
Two heads better than one: pattern discovery in time-evolving multi-aspect data
Abstract. Data stream values are often associated with multiple aspects. For example, each value observed at a given time-stamp from environmental sensors may have an associated ty...
Jimeng Sun, Charalampos E. Tsourakakis, Evan Hoke,...
SCFBM
2008
119views more  SCFBM 2008»
15 years 4 months ago
Permutation - based statistical tests for multiple hypotheses
Background: Genomics and proteomics analyses regularly involve the simultaneous test of hundreds of hypotheses, either on numerical or categorical data. To correct for the occurre...
Anyela Camargo, Francisco Azuaje, Haiying Wang, Hu...