Background: Many bioinformatics applications rely on controlled vocabularies or ontologies to consistently interpret and seamlessly integrate information scattered across public r...
Irena Spasic, Daniel Schober, Susanna-Assunta Sans...
Abstract Anna Blasiak Robert Kleinberg Eyal Lubetzky Index Coding has received considerable attention recently motivated in part by applications such as fast video-on-demand and e...
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Memetic algorithms with continuous local search methods have arisen as effective tools to address the difficulty of obtaining reliable solutions of high precision for complex cont...
Abstract. Categories of lax (T, V )-algebras are shown to have pullbackstable coproducts if T preserves inverse images. The general result not only gives a common proof of this pro...
Mojgan Mahmoudi, Christoph Schubert, Walter Tholen