Sciweavers

718 search results - page 98 / 144
» Toward Models for Forensic Analysis
Sort
View
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 1 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
ICASSP
2011
IEEE
14 years 1 months ago
USPACOR: Universal sparsity-controlling outlier rejection
The recent upsurge of research toward compressive sampling and parsimonious signal representations hinges on signals being sparse, either naturally, or, after projecting them on a...
Georgios B. Giannakis, Gonzalo Mateos, Shahrokh Fa...
BMCBI
2010
165views more  BMCBI 2010»
14 years 10 months ago
Bayesian integrated modeling of expression data: a case study on RhoG
Background: DNA microarrays provide an efficient method for measuring activity of genes in parallel and even covering all the known transcripts of an organism on a single array. T...
Rashi Gupta, Dario Greco, Petri Auvinen, Elja Arja...
BMCBI
2006
147views more  BMCBI 2006»
14 years 9 months ago
A hidden Markov model approach for determining expression from genomic tiling micro arrays
Background: Genomic tiling micro arrays have great potential for identifying previously undiscovered coding as well as non-coding transcription. To-date, however, analyses of thes...
Kasper Munch, Paul P. Gardner, Peter Arctander, An...
ICISC
2009
169views Cryptology» more  ICISC 2009»
14 years 7 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...