Sciweavers

8294 search results - page 1425 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
140
Voted
NDSS
2008
IEEE
15 years 10 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
144
Voted
PLDI
2004
ACM
15 years 9 months ago
Jedd: a BDD-based relational extension of Java
In this paper we present Jedd, a language extension to Java that supports a convenient way of programming with Binary Decision Diagrams (BDDs). The Jedd language abstracts BDDs as...
Ondrej Lhoták, Laurie J. Hendren
AIM
2006
15 years 5 months ago
Observing the use of BPM tools: A step towards flexibility
: The development of the tools of Business Process Management (BPM) arises from the spread of the notion of process in the management universe. The application of BPM to strategic ...
Joseph Heili, Jean-Mathias Heraud, Laure France
173
Voted
BMCBI
2007
102views more  BMCBI 2007»
15 years 4 months ago
A mixture of feature experts approach for protein-protein interaction prediction
High-throughput methods can directly detect the set of interacting proteins in yeast but the results are often incomplete and exhibit high false positive and false negative rates....
Yanjun Qi, Judith Klein-Seetharaman, Ziv Bar-Josep...
DKE
2007
82views more  DKE 2007»
15 years 3 months ago
Eliciting information for product modeling using process modeling
A product model is a formal and structured definition of product information. The most common procedure for defining a product data model is to first describe the business and/...
Ghang Lee, Charles M. Eastman, Rafael Sacks
« Prev « First page 1425 / 1659 Last » Next »