Sciweavers

3318 search results - page 431 / 664
» The Weak Instance Model
Sort
View
140
Voted
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
APBC
2008
231views Bioinformatics» more  APBC 2008»
15 years 5 months ago
Optimal Algorithm for Finding DNA Motifs with Nucleotide Adjacent Dependency
: Finding motifs and the corresponding binding sites is a critical and challenging problem in studying the process of gene expression. String and matrix representations are two pop...
Francis Y. L. Chin, Henry C. M. Leung, Man-Hung Si...
EON
2003
15 years 5 months ago
Racer: A Core Inference Engine for the Semantic Web
In this paper we describe Racer, which can be considered as a core inference engine for the semantic web. The Racer inference server offers two APIs that are already used by at le...
Volker Haarslev, Ralf Möller
SODA
1996
ACM
157views Algorithms» more  SODA 1996»
15 years 5 months ago
Routing and Admission Control in General Topology Networks with Poisson Arrivals
Emerging high speed networks will carry tra c for services such as video-on-demand and video teleconferencing that require resource reservation along the path on which the tra c i...
Anil Kamath, Omri Palmon, Serge A. Plotkin
BMCBI
2006
106views more  BMCBI 2006»
15 years 4 months ago
Methodological study of affine transformations of gene expression data with proposed robust non-parametric multi-dimensional nor
Background: Low-level processing and normalization of microarray data are most important steps in microarray analysis, which have profound impact on downstream analysis. Multiple ...
Henrik Bengtsson, Ola Hössjer