Sciweavers

42738 search results - page 8260 / 8548
» Search Computing Systems
Sort
View
BICOB
2009
Springer
15 years 10 months ago
Assembly of Large Genomes from Paired Short Reads
The de novo assembly of genomes from high-throughput short reads is an active area of research. Several promising methods have been recently developed, with applicability mainly re...
Benjamin G. Jackson, Patrick S. Schnable, Srinivas...
COMPLEX
2009
Springer
15 years 10 months ago
Evolution of the Internet AS-Level Ecosystem
— We seek a simple model that describes how market forces acting on rational players result in the evolution of the multi-faceted topology of the Internet that we see today. We m...
Srinivas Shakkottai, Marina Fomenkov, Ryan Koga, D...
CONCUR
2009
Springer
15 years 10 months ago
Partially-Commutative Context-Free Processes
Bisimulation equivalence is decidable in polynomial time for both sequential and commutative normed context-free processes, known as BPA and BPP, respectively. Despite apparent sim...
Wojciech Czerwinski, Sibylle B. Fröschle, Sla...
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
DCOSS
2009
Springer
15 years 10 months ago
Finding Symbolic Bug Patterns in Sensor Networks
Abstract. This paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous behavior in sensor networks. Often multipl...
Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Ji...
« Prev « First page 8260 / 8548 Last » Next »