Sciweavers

1024 search results - page 26 / 205
» Value complete, column complete, predicate complete
Sort
View
BMCBI
2006
103views more  BMCBI 2006»
14 years 10 months ago
Improving missing value imputation of microarray data by using spot quality weights
Background: Microarray technology has become popular for gene expression profiling, and many analysis tools have been developed for data interpretation. Most of these tools requir...
Peter Johansson, Jari Häkkinen
ACSAC
2009
IEEE
15 years 4 months ago
On the Security of PAS (Predicate-Based Authentication Service)
—Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. T...
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, A...
IPL
1998
73views more  IPL 1998»
14 years 9 months ago
Kleene's Three-Valued Logic and Process Algebra
We propose a combination of Kleene’s three-valued logic and ACP process algebra via the guarded command construct. We present an operational semantics in SOS-style, and a comple...
Jan A. Bergstra, Alban Ponse
COMBINATORICS
2007
60views more  COMBINATORICS 2007»
14 years 9 months ago
Higher Spin Alternating Sign Matrices
We define a higher spin alternating sign matrix to be an integer-entry square matrix in which, for a nonnegative integer r, all complete row and column sums are r, and all partia...
Roger E. Behrend, Vincent A. Knight
AES
2004
Springer
142views Cryptology» more  AES 2004»
15 years 3 months ago
Complementation-Like and Cyclic Properties of AES Round Functions
Abstract. While it is known previously that the cycle lengths of individual components of the AES round function are very small, we demonstrate here that the cycle length of the S-...
Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Y...