Sciweavers

4911 search results - page 285 / 983
» Tree dependence analysis
Sort
View
141
Voted
CSFW
2005
IEEE
15 years 10 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
IPPS
2005
IEEE
15 years 10 months ago
Technology-based Architectural Analysis of Operand Bypass Networks for Efficient Operand Transport
As semiconductor feature sizes decrease, interconnect delay is becoming a dominant component of processor cycle times. This creates a critical need to shift microarchitectural des...
Hongkyu Kim, D. Scott Wills, Linda M. Wills
118
Voted
ATAL
2005
Springer
15 years 10 months ago
Trust evaluation through relationship analysis
Current mechanisms for evaluating the trustworthiness of an agent within an electronic marketplace depend either on using a history of interactions or on recommendations from othe...
Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater...
WABI
2004
Springer
132views Bioinformatics» more  WABI 2004»
15 years 10 months ago
Joint Analysis of DNA Copy Numbers and Gene Expression Levels
Abstract. Genomic instabilities, amplifications, deletions and translocations are often observed in tumor cells. In the process of cancer pathogenesis cells acquire multiple genom...
Doron Lipson, Amir Ben-Dor, Elinor Dehan, Zohar Ya...
BIBE
2007
IEEE
153views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
Combined expression data with missing values and gene interaction network analysis: a Markovian integrated approach
—DNA microarray technologies provide means for monitoring in the order of tens of thousands of gene expression levels quantitatively and simultaneously. However data generated in...
Juliette Blanchet, Matthieu Vignes