Sciweavers

1355 search results - page 167 / 271
» On the multiplication groups of semifields
Sort
View
CN
1999
128views more  CN 1999»
14 years 9 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
TOG
2002
107views more  TOG 2002»
14 years 9 months ago
Ordered and quantum treemaps: Making effective use of 2D space to display hierarchies
Treemaps, a space-filling method of visualizing large hierarchical data sets, are receiving increasing attention. Several algorithms have been proposed to create more useful displ...
Benjamin B. Bederson, Ben Shneiderman, Martin Watt...
BMCBI
2010
153views more  BMCBI 2010»
14 years 9 months ago
DiffCoEx: a simple and sensitive method to find differentially coexpressed gene modules
Background: Large microarray datasets have enabled gene regulation to be studied through coexpression analysis. While numerous methods have been developed for identifying differen...
Bruno M. Tesson, Rainer Breitling, Ritsert C. Jans...
INFSOF
2010
113views more  INFSOF 2010»
14 years 8 months ago
Package Fingerprints: A visual summary of package interface usage
Context: Object-oriented languages such as Java, Smalltalk, and C++ structure their programs using packages. Maintainers of large systems need to understand how packages relate to...
Hani Abdeen, Stéphane Ducasse, Damien Polle...
79
Voted
JSC
2010
155views more  JSC 2010»
14 years 8 months ago
Algorithms for solving linear systems over cyclotomic fields
We consider the problem of solving a linear system Ax = b over a cyclotomic field. What makes cyclotomic fields of special interest is that we can easily find a prime p that sp...
Liang Chen, Michael B. Monagan