Sciweavers

17298 search results - page 3360 / 3460
» Abstract computing machines
Sort
View
WABI
2009
Springer
132views Bioinformatics» more  WABI 2009»
15 years 9 months ago
mpscan: Fast Localisation of Multiple Reads in Genomes
Abstract. With Next Generation Sequencers, sequence based transcriptomic or epigenomic assays yield millions of short sequence reads that need to be mapped back on a reference geno...
Eric Rivals, Leena Salmela, Petteri Kiiskinen, Pet...
167
Voted
WADS
2009
Springer
291views Algorithms» more  WADS 2009»
15 years 9 months ago
On the Power of the Semi-Separated Pair Decomposition
Abstract. A Semi-Separated Pair Decomposition (SSPD), with parameter s > 1, of a set S ⊂ Rd is a set {(Ai, Bi)} of pairs of subsets of S such that for each i, there are balls ...
Mohammad Ali Abam, Paz Carmi, Mohammad Farshi, Mic...
128
Voted
WOLLIC
2009
Springer
15 years 9 months ago
Ludics and Its Applications to Natural Language Semantics
Abstract. Proofs in Ludics, have an interpretation provided by their counter-proofs, that is the objects they interact with. We shall follow the same idea by proposing that sentenc...
Alain Lecomte, Myriam Quatrini
BTW
2009
Springer
153views Database» more  BTW 2009»
15 years 9 months ago
Formalizing ETL Jobs for Incremental Loading of Data Warehouses
Abstract: Extract-transform-load (ETL) tools are primarily designed for data warehouse loading, i.e. to perform physical data integration. When the operational data sources happen ...
Thomas Jörg, Stefan Deßloch
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
« Prev « First page 3360 / 3460 Last » Next »