Sciweavers

400 search results - page 43 / 80
» Derandomization and Distinguishing Complexity
Sort
View
PODS
2003
ACM
114views Database» more  PODS 2003»
16 years 2 months ago
An information-theoretic approach to normal forms for relational and XML data
Normalization as a way of producing good database designs is a well-understood topic. However, the same problem of distinguishing well-designed databases from poorly designed ones...
Marcelo Arenas, Leonid Libkin
BIBE
2009
IEEE
137views Bioinformatics» more  BIBE 2009»
15 years 8 months ago
Multi-Modal Registration of Embryonic Images for In Vitro Fertilization
This paper presents a robust and fully automated registration algorithm for alignment of embryonic images taken by Optical Quadrature Microscopy (OQM) and Differential Interferenc...
Chia-Ling Tsai, Su-Ching Liang, William Warger, Ch...
ICICS
2009
Springer
15 years 8 months ago
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
GLOBECOM
2008
IEEE
15 years 8 months ago
Collusion-Resistant Multi-Winner Spectrum Auction for Cognitive Radio Networks
—In order to fully utilize spectrum, auction-based dynamic spectrum allocation has become a promising approach which allows unlicensed wireless users to lease unused bands from s...
Yongle Wu, Beibei Wang, K. J. Ray Liu, T. Charles ...
HASE
2008
IEEE
15 years 8 months ago
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination
For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
Debmalya Biswas, Thomas Gazagnaire, Blaise Genest