Sciweavers

1510 search results - page 262 / 302
» Upper Probabilities and Additivity
Sort
View
BMCBI
2004
139views more  BMCBI 2004»
14 years 9 months ago
Resolution of large and small differences in gene expression using models for the Bayesian analysis of gene expression levels an
Background: The detection of small yet statistically significant differences in gene expression in spotted DNA microarray studies is an ongoing challenge. Meeting this challenge r...
Jeffrey P. Townsend
84
Voted
VTC
2010
IEEE
113views Communications» more  VTC 2010»
14 years 8 months ago
Multi-Level Turbo Decoding Assisted Soft Combining Aided Hybrid ARQ
—1 Hybrid Automatic Repeat reQuest (ARQ) plays an essential role in error control. Combining the incorrectly received packet replicas in hybrid ARQ has been shown to reduce the r...
Hong Chen, Robert G. Maunder, Lajos Hanzo
ICWSM
2009
14 years 7 months ago
Content Based Recommendation and Summarization in the Blogosphere
This paper presents a stochastic graph based method for recommending or selecting a small subset of blogs that best represents a much larger set. within a certain topic. Each blog...
Ahmed Hassan, Dragomir R. Radev, Junghoo Cho, Amru...
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
14 years 1 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
IACR
2011
132views more  IACR 2011»
13 years 9 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...