Sciweavers

1008 search results - page 194 / 202
» Canonicity!
Sort
View
BMCBI
2010
151views more  BMCBI 2010»
14 years 10 months ago
TF-finder: A software package for identifying transcription factors involved in biological processes using microarray data and e
Background: Identification of transcription factors (TFs) involved in a biological process is the first step towards a better understanding of the underlying regulatory mechanisms...
Xiaoqi Cui, Tong Wang, Huann-Sheng Chen, Victor Bu...
CGF
2008
124views more  CGF 2008»
14 years 10 months ago
Fast Soft Self-Shadowing on Dynamic Height Fields
We present a new, real-time method for rendering soft shadows from large light sources or lighting environments on dynamic height fields. The method first computes a horizon map f...
John Snyder, Derek Nowrouzezahrai
CORR
2010
Springer
106views Education» more  CORR 2010»
14 years 10 months ago
The WebContent XML Store
In this article, we describe the XML storage system used in the WebContent project. We begin by advocating the use of an XML database in order to store WebContent documents, and w...
Benjamin Nguyen, Spyros Zoupanos
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 10 months ago
Flows and Decompositions of Games: Harmonic and Potential Games
In this paper we introduce a novel flow representation for finite games in strategic form. This representation allows us to develop a canonical direct sum decomposition of an arbi...
Ozan Candogan, Ishai Menache, Asuman E. Ozdaglar, ...
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 10 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya