Learn More
To identify the genetic modifier(s) that might alter the age at onset in Huntington's disease (HD) we have analyzed variations in GluR6 kainate receptor (GluR6), CA150 gene, Delta2642 and polymorphic CCG repeat variation in huntingtin (htt) gene in 77 HD patients and normal individuals. In addition, variation in the RAI1 gene was analyzed in 30(More)
Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to(More)
The k-means++ seeding algorithm is one of the most popular algorithms that is used for finding the initial k centers when using the k-means heuristic. The algorithm is a simple sampling procedure and can be described as follows: Pick the first center randomly from the given points. For i > 1, pick a point to be the i th center with probability proportional(More)
Space efficient algorithms play an important role in dealing with large amount of data. In such settings, one would like to analyze the large data using small amount of “working space”. One of the key steps in many algorithms for analyzing large data is to maintain a (or a small number) random sample from the data points. In this paper, we consider two(More)
Eta pairing on a supersingular elliptic curve over the binary field F 2 1223 used to offer 128-bit security, and has been studied extensively for efficient implementations. In this paper, we report our GPU-based implementations of this algorithm on an NVIDIA Tesla C2050 platform. We propose efficient parallel implementation strategies for multiplication,(More)