Sciweavers

3618 search results - page 508 / 724
» Additive functions for number systems in function fields
Sort
View
POLICY
2007
Springer
15 years 11 months ago
An Automated Framework for Validating Firewall Policy Enforcement
The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...
144
Voted
SODA
2004
ACM
121views Algorithms» more  SODA 2004»
15 years 6 months ago
A characterization of easily testable induced subgraphs
Let H be a fixed graph on h vertices. We say that a graph G is induced H-free if it does not contain any induced copy of H. Let G be a graph on n vertices and suppose that at leas...
Noga Alon, Asaf Shapira
NAR
2011
227views Computer Vision» more  NAR 2011»
14 years 7 months ago
CADgene: a comprehensive database for coronary artery disease genes
Coronary artery disease (CAD) is a complex, multifactorial disease and a leading cause of mortality world wide. Over the past decades, great efforts have been made to elucidate th...
Hui Liu, Wei Liu, Yifang Liao, Long Cheng, Qian Li...
KDD
2002
ACM
182views Data Mining» more  KDD 2002»
16 years 5 months ago
ANF: a fast and scalable tool for data mining in massive graphs
Graphs are an increasingly important data source, with such important graphs as the Internet and the Web. Other familiar graphs include CAD circuits, phone records, gene sequences...
Christopher R. Palmer, Phillip B. Gibbons, Christo...
STOC
2010
ACM
189views Algorithms» more  STOC 2010»
16 years 2 months ago
Near-optimal extractors against quantum storage
We give near-optimal constructions of extractors secure against quantum bounded-storage adversaries. One instantiation gives the first such extractor to achieve an output length (...
Anindya De and Thomas Vidick