Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Abstract. We present a new approach to biometrics that makes probabilistic inferences about matching without ever estimating an identity "template". The biometric data is...
Simon J. D. Prince, Jania Aghajanian, Umar Mohamme...
We propose an iterative probabilistic algorithm for estimation of RNA secondary structure using sequence data from two homologous sequences. The method is intended to exploit inte...
Arif Ozgun Harmanci, Gaurav Sharma, David H. Mathe...
ion levels. The framework also supports the generation of test constraints, which can be satisfied using a constraint solver to generate tests. A compositional verification approac...
Background: We consider the discovery of recombinant segments jointly with their origins within multilocus DNA sequences from bacteria representing heterogeneous populations of fa...
Pekka Marttinen, Adam Baldwin, William P. Hanage, ...