Sciweavers

5668 search results - page 1026 / 1134
» The case for software evolution
Sort
View
CONSTRAINTS
2008
95views more  CONSTRAINTS 2008»
14 years 10 months ago
Efficient Sequence Alignment with Side-Constraints by Cluster Tree Elimination
Aligning DNA and protein sequences is a core technique in molecular biology. Often, it is desirable to include partial prior knowledge and conditions in an alignment. Going beyond...
Sebastian Will, Anke Busch, Rolf Backofen
CORR
2010
Springer
66views Education» more  CORR 2010»
14 years 10 months ago
Efficient Dealiased Convolutions without Padding
Algorithms are developed for calculating dealiased linear convolution sums without the expense of conventional zero-padding or phase-shift techniques. For one-dimensional in-place ...
John C. Bowman, Malcolm Roberts
CORR
2008
Springer
102views Education» more  CORR 2008»
14 years 10 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
CORR
2008
Springer
102views Education» more  CORR 2008»
14 years 10 months ago
Spreadsheet modelling for solving combinatorial problems: The vendor selection problem
Spreadsheets have grown up and became very powerful and easy to use tools in applying analytical techniques for solving business problems. Operations managers, production managers...
Pandelis G. Ipsilandis
AAMAS
2006
Springer
14 years 10 months ago
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
In many dynamic open systems, agents have to interact with one another to achieve their goals. Here, agents may be self-interested and when trusted to perform an action for another...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
« Prev « First page 1026 / 1134 Last » Next »