Sciweavers

2949 search results - page 339 / 590
» Universal Sparse Modeling
Sort
View
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 4 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
120
Voted
BMCBI
2004
185views more  BMCBI 2004»
15 years 19 days ago
Linear fuzzy gene network models obtained from microarray data by exhaustive search
Background: Recent technological advances in high-throughput data collection allow for experimental study of increasingly complex systems on the scale of the whole cellular genome...
Bahrad A. Sokhansanj, J. Patrick Fitch, Judy N. Qu...
90
Voted
IM
2003
15 years 2 months ago
Generic On-Line Discovery of Quantitative Models for Service Level Management
: Quantitative models are needed for a variety of management tasks, including (a) identification of critical variables to use for health monitoring, (b) anticipating service level...
Yixin Diao, Frank Eskesen, Steve Froehlich, Joseph...
129
Voted
SENSYS
2010
ACM
14 years 10 months ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....
EMSOFT
2008
Springer
15 years 2 months ago
Automatically transforming and relating Uppaal models of embedded systems
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
Timothy Bourke, Arcot Sowmya