Sciweavers

10568 search results - page 1770 / 2114
» Computer Intelligence and Formalization
Sort
View
ISMB
2000
15 years 6 months ago
Mining for Putative Regulatory Elements in the Yeast Genome Using Gene Expression Data
We have developed a set of methods and tools for automatic discovery of putative regulatory signals in genome sequences. The analysis pipeline consists of gene expression data clu...
Jaak Vilo, Alvis Brazma, Inge Jonassen, Alan J. Ro...
IJCAI
1989
15 years 6 months ago
Reasoning about Kinematic Topology
t ion which is much more abstract than a place vocabulary, the kinematic topology. Kinematic topology does not define qualitative inference rules, but provides a characterization o...
Boi Faltings, Emmanuel Baechler, J. Primus
136
Voted
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
15 years 6 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
DEBS
2008
ACM
15 years 6 months ago
Availability models for underlay aware overlay networks
Availability of an overlay network is a necessary condition for event delivery in event based systems. The availability of the overlay links depends on the underlying physical net...
Madhu Kumar SD, Umesh Bellur
SIGMETRICS
2010
ACM
193views Hardware» more  SIGMETRICS 2010»
15 years 5 months ago
Distributed caching over heterogeneous mobile networks
Sharing content over a mobile network through opportunistic contacts has recently received considerable attention. In proposed scenarios, users store content they download in a lo...
Stratis Ioannidis, Laurent Massoulié, Augus...
« Prev « First page 1770 / 2114 Last » Next »