Sciweavers

1763 search results - page 319 / 353
» A Formalization of Polytime Functions
Sort
View
BMCBI
2008
122views more  BMCBI 2008»
14 years 9 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...
JUCS
2008
115views more  JUCS 2008»
14 years 9 months ago
Capturing Interaction Requirements in a Model Transformation Technology Based on MDA
: Currently, many models are used to capture functional software requirements. However, the Software Engineering community has faded interaction requirements into the background, d...
José Ignacio Panach, Sergio España, ...
IIE
2007
116views more  IIE 2007»
14 years 9 months ago
Turtle's Navigation and Manipulation of Geometrical Figures Constructed by Variable Processes in a 3d Simulated Space
Abstract. Issues related to 3d turtle’s navigation and geometrical figures’ manipulation in the simulated 3d space of a newly developed computational environment, MaLT, are re...
Chronis Kynigos, Maria Latsi
COMGEO
2004
ACM
14 years 9 months ago
On simplifying dot maps
Dot maps--drawings of point sets--are a well known cartographic method to visualize density functions over an area. We study the problem of simplifying a given dot map: given a se...
Mark de Berg, Prosenjit Bose, Otfried Cheong, Pat ...
JOC
2000
95views more  JOC 2000»
14 years 9 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer