Sciweavers

3108 search results - page 88 / 622
» The Elements of Computer Credibility
Sort
View
GG
2008
Springer
15 years 5 months ago
Model-Driven Development of Model Transformations
The model-driven development of model transformations requires both a technique to model model transformations as well as a means to transform transformation models. Therefore, t...
Pieter Van Gorp
BMCBI
2006
108views more  BMCBI 2006»
15 years 4 months ago
Probe set algorithms: is there a rational best bet?
Affymetrix microarrays have become a standard experimental platform for studies of mRNA expression profiling. Their success is due, in part, to the multiple oligonucleotide featur...
Jinwook Seo, Eric P. Hoffman
SIAMNUM
2010
114views more  SIAMNUM 2010»
14 years 11 months ago
A Posteriori Error Estimation Based on Potential and Flux Reconstruction for the Heat Equation
We derive a posteriori error estimates for the discretization of the heat equation in a unified and fully discrete setting comprising the discontinuous Galerkin, finite volume, mix...
Alexandre Ern, Martin Vohralík
ICALP
2007
Springer
15 years 10 months ago
Constant-Round Private Database Queries
We consider several private database query problems. The starting point of this work is the element rank problem: the server holds a database of n integers, and the user an integer...
Nenad Dedic, Payman Mohassel
ESA
2003
Springer
93views Algorithms» more  ESA 2003»
15 years 9 months ago
Improved Bounds for Finger Search on a RAM
We present a new finger search tree with O(1) worst-case update time and O(log log d) expected search time with high probability in the Random Access Machine (RAM) model of comput...
Alexis C. Kaporis, Christos Makris, Spyros Sioutas...