Sciweavers

359 search results - page 71 / 72
» On the Optimal Ordering of Maps and Selections under Factori...
Sort
View
CCS
2004
ACM
13 years 11 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
AICOM
2006
129views more  AICOM 2006»
13 years 5 months ago
A backjumping technique for Disjunctive Logic Programming
In this work we present a backjumping technique for Disjunctive Logic Programming (DLP) under the Answer Set Semantics. It builds upon related techniques that had originally been p...
Francesco Ricca, Wolfgang Faber, Nicola Leone
SIAMCOMP
2002
142views more  SIAMCOMP 2002»
13 years 5 months ago
On Binary Searching with Nonuniform Costs
Let us consider an ordered vector A[1 : n]. If the cost of testing each position is similar, then the standard binary search is the best strategy to search the vector. This is true...
Eduardo Sany Laber, Ruy Luiz Milidiú, Artur...
DAC
2004
ACM
14 years 6 months ago
Dynamic FPGA routing for just-in-time FPGA compilation
Just-in-time (JIT) compilation has previously been used in many applications to enable standard software binaries to execute on different underlying processor architectures. Howev...
Roman L. Lysecky, Frank Vahid, Sheldon X.-D. Tan
BMCBI
2007
123views more  BMCBI 2007»
13 years 5 months ago
Heritable clustering and pathway discovery in breast cancer integrating epigenetic and phenotypic data
Background: In order to recapitulate tumor progression pathways using epigenetic data, we developed novel clustering and pathway reconstruction algorithms, collectively referred t...
Zailong Wang, Pearlly Yan, Dustin P. Potter, Chari...