Sciweavers

10819 search results - page 1892 / 2164
» Addition and multiplication of sets
Sort
View
CPM
1993
Springer
154views Combinatorics» more  CPM 1993»
15 years 4 months ago
On Suboptimal Alignments of Biological Sequences
It is widely accepted that the optimal alignment between a pair of proteins or nucleic acid sequences that minimizes the edit distance may not necessarily re ect the correct biolog...
Dalit Naor, Douglas L. Brutlag
AIED
2007
Springer
15 years 4 months ago
Evaluating a Collaborative Constraint-based Tutor for UML Class Diagrams
COLLECT-UML is a collaborative constraint-based tutor for teaching object-oriented analysis and design using Unified Modelling Language. It is the first system in the family of con...
Nilufar Baghaei, Antonija Mitrovic
102
Voted
COMPGEOM
2007
ACM
15 years 4 months ago
Guard placement for efficient point-in-polygon proofs
We consider the problem of placing a small number of angle guards inside a simple polygon P so as to provide efficient proofs that any given point is inside P. Each angle guard vi...
David Eppstein, Michael T. Goodrich, Nodari Sitchi...
97
Voted
DEBS
2007
ACM
15 years 4 months ago
SpiderCast: a scalable interest-aware overlay for topic-based pub/sub communication
We introduce SpiderCast, a distributed protocol for constructing scalable churn-resistant overlay topologies for supporting decentralized topic-based pub/sub communication. Spider...
Gregory Chockler, Roie Melamed, Yoav Tock, Roman V...
107
Voted
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 4 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
« Prev « First page 1892 / 2164 Last » Next »