Sciweavers

2412 search results - page 398 / 483
» Which Problems Have Strongly Exponential Complexity
Sort
View
126
Voted
TCBB
2010
144views more  TCBB 2010»
14 years 7 months ago
Querying Graphs in Protein-Protein Interactions Networks Using Feedback Vertex Set
Recent techniques increase rapidly the amount of our knowledge on interactions between proteins. The interpretation of these new information depends on our ability to retrieve kno...
Guillaume Blin, Florian Sikora, Stéphane Vi...
127
Voted
IIWAS
2007
15 years 2 months ago
User Data Privacy in Web Services Context Using Semantic Desktop - SemanticLIFE Case Study
The growing number of Web Services technologies and their use have revolutionized the web. Web Services will play an important role in the next web generation (i.e. Semantic Web) ...
Mansoor Ahmed, Amin Andjomshoaa, A. Min Tjoa
110
Voted
BMCBI
2005
101views more  BMCBI 2005»
15 years 22 days ago
MASQOT: a method for cDNA microarray spot quality control
Background: cDNA microarray technology has emerged as a major player in the parallel detection of biomolecules, but still suffers from fundamental technical problems. Identifying ...
Max Bylesjö, Daniel Eriksson, Andreas Sjö...
JOC
2000
181views more  JOC 2000»
15 years 18 days ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
132
Voted
TON
2002
144views more  TON 2002»
15 years 14 days ago
Algorithms for provisioning virtual private networks in the hose model
Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for great...
Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, ...