Sciweavers

16513 search results - page 2949 / 3303
» Numerical Analysis Methods
Sort
View
144
Voted
BIBE
2004
IEEE
15 years 8 months ago
Phylogenetic Reconstruction from Arbitrary Gene-Order Data
Phylogenetic reconstruction from gene-order data has attracted attention from both biologists and computer scientists over the last few years. So far, our software suite GRAPPA is...
Jijun Tang, Bernard M. E. Moret, Liying Cui, Claud...
CSB
2004
IEEE
173views Bioinformatics» more  CSB 2004»
15 years 8 months ago
Gene Ontology Friendly Biclustering of Expression Profiles
The soundness of clustering in the analysis of gene expression profiles and gene function prediction is based on the hypothesis that genes with similar expression profiles may imp...
Jinze Liu, Wei Wang 0010, Jiong Yang
CSFW
2004
IEEE
15 years 8 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
BIRTHDAY
2006
Springer
15 years 8 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle
CAISE
2006
Springer
15 years 8 months ago
An Efficient Approach to Support Querying Secure Outsourced XML Information
Abstract. Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption propos...
Yin Yang, Wilfred Ng, Ho Lam Lau, James Cheng
« Prev « First page 2949 / 3303 Last » Next »