نتایج جستجو برای: fingerprinting properties
تعداد نتایج: 877840 فیلتر نتایج به سال:
Recombined fingerprints have been suggested as a convenient approach to improve the efficiency of anonymous fingerprinting for the legal distribution of copyrighted multimedia contents in P2P systems. The recombination idea is inspired by the principles of mating, recombination and heredity of the DNA sequences of living beings, but applied to binary sequences, like in genetic algorithms. Howev...
Several genetic loci have been utilized to genotype isolates of Mycobacterium tuberculosis. A shortcoming of the most commonly used method, IS6110 fingerprinting, is that it does not adequately discriminate between isolates having few copies of IS6110. This study was undertaken to compare pTBN12 fingerprinting of polymorphic GC-rich repetitive sequence genes and spoligotyping of the direct repe...
Fingerprinting schemes deter people from illegally redistributing digital data by enabling the original merchant of the data to identify the original buyer of a redistributed copy. Recently, asymmetric fingerprinting schemes were introduced. Here, only the buyer knows the fingerprinted copy after a sale, and if the merchant finds this copy somewhere, he obtains a proof that it was the copy of t...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a remote computer’s network stack. The combination of such information can be then used to infer the remote operating system (OS fingerprinting). OS fingerprinting is traditionally based on a database of “signatures”. A signature comprises several features (i.e., pairs attribute/value) extracted from...
DNA fingerprinting of Mycobacterium tuberculosis has been shown to be a powerful epidemiologic tool. We propose a standardized technique which exploits variability in both the number and genomic position of IS6110 to generate strain-specific patterns. General use of this technique will permit comparison of results between different laboratories. Such comparisons will facilitate investigations i...
We propose a generalization of the quantum hashing technique based on the notion of the small-bias sets. These sets have proved useful in different areas of computer science, and here their properties give an optimal construction for succinct quantum presentation of elements of any finite abelian group, which can be used in various computational and cryptographic scenarios. The known quantum fi...
Despite the wealth of data on RNA secondary structure, conformational dynamics and tertiary structure in vitro and in vivo, predicting RNA biological activity in cellular environments remains difficult. Here, we present a comparison between in silico RNA fingerprinting and published experimental data that sheds light on efficient design of the hammerhead ribozyme molecules with a high intracell...
We use a method recently introduced by Simone and Škorić to study accusation probabilities for non-binary Tardos fingerprinting codes. We generalize the pre-computation steps in this approach to include a broad class of collusion attack strategies. We analytically derive properties of a special attack that asymptotically maximizes false accusation probabilities. We present numerical results on ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید