Filters








1,528 Hits in 2.5 sec

Computing preimages of Boolean Networks [article]

Johannes Georg Klotz, Martin Bossert, Steffen Schober
2013 arXiv   pre-print
In this paper we present an algorithm to address the predecessor problem of feed-forward Boolean networks. We propose an probabilistic algorithm, which solves this problem in linear time with respect to the number of nodes in the network. Finally, we evaluate our algorithm for random Boolean networks and the regulatory network of Escherichia coli.
arXiv:1302.3723v1 fatcat:zmeuirmoufdq7alvm4hpo3kdua

On Error Correction for Physical Unclonable Functions [article]

Sven Puchinger and Sven Müelich and Martin Bossert and Matthias Hiller and Georg Sigl
2015 arXiv   pre-print
Physical Unclonable Functions evaluate manufacturing variations to generate secure cryptographic keys for embedded systems without secure key storage. It is explained how methods from coding theory are applied in order to ensure reliable key reproduction. We show how better results can be obtained using code classes and decoding principles not used for this scenario before. These methods are exemplified by specific code constructions which improve existing codes with respect to error probability, decoding complexity and codeword length.
arXiv:1501.06698v1 fatcat:67obivsjf5fjpj2eztxne3vck4

Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes [article]

Sven Müelich, Sven Puchinger, Martin Bossert, Matthias Hiller and Georg Sigl
2014 arXiv   pre-print
Physical Unclonable Functions can be used for secure key generation in cryptographic applications. It is explained how methods from coding theory must be applied in order to ensure reliable key regeneration. Based on previous work, we show ways how to obtain better results with respect to error probability and codeword length. Also, an example based on Generalized Concatenated codes is given, which improves upon used coding schemes for PUFs.
arXiv:1407.8034v1 fatcat:jlptnfqoovdutc3vgrzcl4ze7y

Canalizing Boolean Functions Maximize the Mutual Information [article]

Johannes Georg Klotz, David Kracht, Martin Bossert, Steffen Schober
2012 arXiv   pre-print
The ability of information processing in biologically motivated Boolean networks is of interest in recent information theoretic research. One measure to quantify this ability is the well known mutual information. Using Fourier analysis we show that canalizing functions maximize the mutual information between an input variable and the outcome of the function. We proof our result for Boolean functions with uniform distributed as well as product distributed input variables.
arXiv:1207.7193v2 fatcat:oz2rsei22ncvnoyrajd6teef2u

MEIOTIC RECOMBINATION, CROSS-REACTIVITY, AND PERSISTENCE IN PLASMODIUM FALCIPARUM

F. Ellis McKenzie, Marcelo U. Ferreira, J. Kevin Baird, Georges Snounou, William H. Bossert
2001 Evolution  
Our model has a number of shortcomings, some of which might be addressed by incorporating more detailed models of within-host parasite dynamics Bossert 1997b, 1998) .  ...  at frequencies far below those expected; in either case, mixed infections occurred in mosquitoes at frequencies above those expected (in line with field data on mixed-species Plasmodium infections; Bossert  ... 
doi:10.1554/0014-3820(2001)055[1299:mrcrap]2.0.co;2 fatcat:hwgm3ipmsnf6dhisgadmegq67m

MEIOTIC RECOMBINATION, CROSS-REACTIVITY, AND PERSISTENCE IN PLASMODIUM FALCIPARUM

F. Ellis McKenzie, Marcelo U. Ferreira, J. Kevin Baird, Georges Snounou, William H. Bossert
2001 Evolution  
Our model has a number of shortcomings, some of which might be addressed by incorporating more detailed models of within-host parasite dynamics Bossert 1997b, 1998) .  ...  at frequencies far below those expected; in either case, mixed infections occurred in mosquitoes at frequencies above those expected (in line with field data on mixed-species Plasmodium infections; Bossert  ... 
doi:10.1111/j.0014-3820.2001.tb00652.x pmid:11525454 pmcid:PMC2504330 fatcat:nx2hw4c5kbhlpmfcqqfrcjzyaa

Syndrome Decoding of Reed-Solomon Codes Beyond Half the Minimum Distance based on Shift-Register Synthesis [article]

Georg Schmidt, Vladimir R. Sidorenko, Martin Bossert
2007 arXiv   pre-print
Sidorenko and Georg Schmidt is supported by Deutsche Forschungsgemeinschaft (DFG), Germany, under project BO 867/14 and project BO 867/15 respectively.  ... 
arXiv:cs/0702130v1 fatcat:ok3nz2ufbvgsjjdgbivpjtfzt4

Collaborative Decoding of Interleaved Reed-Solomon Codes and Concatenated Code Designs [article]

Georg Schmidt, Vladimir R. Sidorenko, Martin Bossert
2006 arXiv   pre-print
Sidorenko and Georg Schmidt is supported by Deutsche Forschungsgemeinschaft (DFG), Germany, under project BO 867/14, and BO 867/15 respectively. V. R. Sidorenko is on leave from IITP, RAS RU.  ... 
arXiv:cs/0610074v2 fatcat:t5yanwogkvgvznelh7mwgxw4re

Towards automated protocol reverse engineering using semantic information

Georges Bossert, Frédéric Guihéry, Guillaume Hiet
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
Network security products, such as NIDS or application firewalls, tend to focus on application level communication flows. However, adding support for new proprietary and often undocumented protocols, implies the reverse engineering of these protocols. Currently, this task is performed manually. Considering the difficulty and time needed for manual reverse engineering of protocols, one can easily understand the importance of automating this task. This is even given more significance in today's
more » ... bersecurity context where reaction time and automated adaptation become a priority. Several studies were carried out to infer protocol's specifications from traces. As shown in this article, they do not provide accurate results on complex protocols and are often not applicable in an operational context to provide parsers or traffic generators, some key indicators of the quality of obtained specifications. In addition, too few previous works have resulted in the publication of tools that would allow the scientific community to experimentally validate and compare the different approaches. In this paper, we infer the specifications out of complex protocols by means of an automated approach and novel techniques. Based on communication traces, we reverse the vocabulary of a protocol by considering embedded contextual information. We also use this information to improve message clustering and to enhance the identification of fields boundaries. We then show the viability of our approach through a comparative study including our re-implementation of three other state-of-the-art approaches (ASAP, Discoverer and ScriptGen).
doi:10.1145/2590296.2590346 dblp:conf/ccs/BossertGH14 fatcat:lhgbrybovnd7xktiuhnzwdizhu

Properties of Boolean networks and methods for their tests

Johannes Georg Klotz, Ronny Feuer, Oliver Sawodny, Martin Bossert, Michael Ederer, Steffen Schober
2013 EURASIP Journal on Bioinformatics and Systems Biology  
Acknowledgements The authors would like to thank Georg Sprenger and Katrin Gottlieb from the Institute for Microbiology at the University of Stuttgart for fruitful collaboration and discussions.  ... 
doi:10.1186/1687-4153-2013-1 pmid:23311536 pmcid:PMC3605186 fatcat:5kcexsc3crfbbmjmcmex6qihn4

Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems

Georges Bossert, Guillaume Hiet, Thibaut Henin
2011 2011 Conference on Network and Information Systems Security  
The purpose of this paper is the modelization and simulation of zombie machines for the evaluation of Network Intrusion Detection Systems (NIDS), used to detect botnets. We propose an automatic method to infer zombies behaviours through the analysis of messages exchanged with their masters. Once computed, a model provides a solution to generate realistic and manageable traffic, which is mandatory for an NIDS evaluation. We propose to use a Stochastic Mealy Machine to model zombies behaviour,
more » ... an active inference algorithm to learn it. With our approach, it is possible to generate a realistic traffic corresponding to the communications of botnets while ensuring its controllability in the context of an NIDS evaluation.
doi:10.1109/sar-ssi.2011.5931397 fatcat:ecz6j346srfcdcpjyjcczskh2q

Model-based analysis of an adaptive evolution experiment with Escherichia coli in a pyruvate limited continuous culture with glycerol

Ronny Feuer, Katrin Gottlieb, Gero Viertel, Johannes Klotz, Steffen Schober, Martin Bossert, Oliver Sawodny, Georg Sprenger, Michael Ederer
2012 EURASIP Journal on Bioinformatics and Systems Biology  
Bacterial strains that were genetically blocked in important metabolic pathways and grown under selective conditions underwent a process of adaptive evolution: certain pathways may have been deregulated and therefore allowed for the circumvention of the given block. A block of endogenous pyruvate synthesis from glycerol was realized by a knockout of pyruvate kinase and phosphoenolpyruvate carboxylase in E. coli. The resulting mutant strain was able to grow on a medium containing glycerol and
more » ... tate, which served as an exogenous pyruvate source. Heterologous expression of a pyruvate carboxylase gene from Corynebacterium glutamicum was used for anaplerosis of the TCA cycle. Selective conditions were controlled in a continuous culture with limited lactate feed and an excess of glycerol feed. After 200-300 generations pyruvate-prototrophic mutants were isolated. The genomic analysis of an evolved strain revealed that the genotypic basis for the regained pyruvate-prototrophy was not obvious. A constraint-based model of the metabolism was employed to compute all possible detours around the given metabolic block by solving a hierarchy of linear programming problems. The regulatory network was expected to be responsible for the adaptation process. Hence, a Boolean model of the transcription factor network was connected to the metabolic model. Our model analysis only showed a marginal impact of transcriptional control on the biomass yield on substrate which is a key variable in the selection process. In our experiment, microarray analysis confirmed that transcriptional control probably played a minor role in the deregulation of the alternative pathways for the circumvention of the block.
doi:10.1186/1687-4153-2012-14 pmid:23033959 pmcid:PMC3534542 fatcat:iq672d2af5b7bjx7gmiduxwgcy

Traceability of values for catalytic activity concentration of enzymes: a Certified Reference Material for aspartate transaminase

Brigitte Toussaint, Hendrik Emons, Heinz G. Schimmel, Steffen Bossert-Reuther, Francesca Canalias, Ferruccio Ceriotti, Georges Férard, Carlo A. Ferrero, Paul F.H. Franck, F. Javier Gella, Joseph Henny, Poul J. Jørgensen (+6 others)
2010 Clinical Chemistry and Laboratory Medicine  
A new reference material for the liver enzyme aspartate transaminase (AST) (L-aspartate: 2-oxoglutarateaminotransferase, EC 2.6.1.1), also called aspartate aminotransferase (ASAT), has been developed under the code ERM-AD457/IFCC. This certified reference material (CRM) for AST has been produced from a human type recombinant AST expressed in Escherichia coli and a buffer containing bovine serum albumin, and has been lyophilised. Methods: The homogeneity and the stability of the material have
more » ... n tested and the catalytic activity concentration has been characterised by 12 laboratories using the reference procedure for AST at 378C from the International Federation of Clinical Chemistry and Laboratory Medicine (IFCC). Results: The certified catalytic activity concentration and certified uncertainty of AST in the reconstituted material are (1.74"0.05) mkat/L or (104.6"2.7) U/L (with a coverage factor ks2; 95% confidence interval). Conclusions: Both the certified value and uncertainty are traceable to the International System of Units (SI). The material is aiming to control the IFCC reference procedure for AST at 378C, which will then be used to assign values to calibrants and control materials. The present paper highlights the scientific challenges and innovations which were encountered during the development of this new CRM. Clin Chem Lab Med 2010;48:795-803.
doi:10.1515/cclm.2010.146 pmid:20441466 fatcat:k3gqsjdwhrewhep4ronncptsbe

Comments on the article by Tabache F. et al. "Acute polyarthritis after influenza A H1N1 immunization", Joint Bone Spine, 2011, doi:10.1016/j.jbs.2011.02.007: Primary Sjögren's syndrome occurring after influenza A H1N1 vaccine administration

Éric Toussirot, Marie Bossert, Georges Herbein, Philippe Saas
2012 Joint Bone Spine  
4 , Georges Herbein 3,5 , Philippe Saas 2,,6, 7,8 1-University hospital de Besançon, department of rheumatology, 25000 Besançon, France 2-University hospital de Besançon,CIC Biotherapy-506, 25000  ...  Rheumatology, Centre Hospitalier, 25200 Montbeliard, France 5-University hospital de Besançon, department of Virology, 25000 Besançon Submitted on 7 May 2013 Correspondence Éric Toussirot 1,2,3 , Marie Bossert  ... 
doi:10.1016/j.jbspin.2011.09.013 pmid:22115587 fatcat:de5u27amkfh67njxwys2mdfhre

Page 293 of National Union Catalog Vol. 7, Issue [page]

1963 National Union Catalog  
Gurvitch, Georges, 1894- 2. Sociology. NeD NUC64-60685 NUC64-10103 22 cm. of the total 63. em.  ...  BU Bosserman, Charles Phillip, 1931- Georges Gurvitch's sociology social phenomena. Boston, 19 viii, 4701. illus., port. 29 Thesis—Boston University. Vita.  ... 
« Previous Showing results 1 — 15 out of 1,528 results