Sciweavers

4541 search results - page 889 / 909
» Cache-Oblivious Algorithms and Data Structures
Sort
View
87
Voted
CCS
2008
ACM
15 years 27 days ago
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma
Multisignatures allow n signers to produce a short joint signature on a single message. Multisignatures were achieved in the plain model with a non-interactive protocol in groups ...
Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki
99
Voted
CF
2005
ACM
15 years 26 days ago
Evaluation of extended dictionary-based static code compression schemes
This paper evaluates how much extended dictionary-based code compression techniques can reduce the static code size. In their simplest form, such methods statically identify ident...
Martin Thuresson, Per Stenström
76
Voted
DGO
2006
134views Education» more  DGO 2006»
15 years 9 days ago
Next steps in near-duplicate detection for eRulemaking
Large volume public comment campaigns and web portals that encourage the public to customize form letters produce many near-duplicate documents, which increases processing and sto...
Hui Yang, Jamie Callan, Stuart W. Shulman
91
Voted
CSL
2010
Springer
15 years 11 hour ago
Embedding Deduction Modulo into a Prover
Deduction modulo consists in presenting a theory through rewrite rules to support automatic and interactive proof search. It induces proof search methods based on narrowing, such a...
Guillaume Burel
83
Voted
BMCBI
2010
100views more  BMCBI 2010»
14 years 11 months ago
Partitioning of copy-number genotypes in pedigrees
Background: Copy number variations (CNVs) and polymorphisms (CNPs) have only recently gained the genetic community's attention. Conservative estimates have shown that CNVs an...
Louis-Philippe Lemieux Perreault, Gregor U. Andelf...