Sciweavers

27827 search results - page 5481 / 5566
» Generating
Sort
View
BIBM
2010
IEEE
286views Bioinformatics» more  BIBM 2010»
14 years 9 months ago
Evaluation of short read metagenomic assembly
Advances in sequencing technologies have equipped researchers with the ability to sequence the collective genome of entire microbial communities commonly referred to as metagenomi...
Anveshi Charuvaka, Huzefa Rangwala
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 9 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CASCON
2010
174views Education» more  CASCON 2010»
14 years 9 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
CIKM
2010
Springer
14 years 9 months ago
Automatic schema merging using mapping constraints among incomplete sources
Schema merging is the process of consolidating multiple schemas into a unified view. The task becomes particularly challenging when the schemas are highly heterogeneous and autono...
Xiang Li 0002, Christoph Quix, David Kensche, Sand...
CIKM
2010
Springer
14 years 9 months ago
Mining topic-level influence in heterogeneous networks
Influence is a complex and subtle force that governs the dynamics of social networks as well as the behaviors of involved users. Understanding influence can benefit various applic...
Lu Liu, Jie Tang, Jiawei Han, Meng Jiang, Shiqiang...
« Prev « First page 5481 / 5566 Last » Next »