Sciweavers

2085 search results - page 289 / 417
» Special interest groups
Sort
View
91
Voted
SIGCSE
2005
ACM
116views Education» more  SIGCSE 2005»
15 years 6 months ago
A company-based framework for a software engineering course
The subject matter of a typical undergraduate software engineering course, while providing necessary background, can be quite dry. Team-based programming projects often complement...
Thomas P. Way
GD
2005
Springer
15 years 6 months ago
C-Planarity of Extrovert Clustered Graphs
A clustered graph has its vertices grouped into clusters in a hierarchical way via subset inclusion, thereby imposing a tree structure on the clustering relationship. The c-planari...
Michael T. Goodrich, George S. Lueker, Jonathan Z....
ICCS
2005
Springer
15 years 6 months ago
Phylogenetic Networks, Trees, and Clusters
Phylogenetic networks model evolutionary histories in the presence of non-treelike events such as hybrid speciation and horizontal gene transfer. In spite of their widely acknowled...
Luay Nakhleh, Li-San Wang
117
Voted
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
15 years 6 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han
112
Voted
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 6 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani