Sciweavers

8825 search results - page 1746 / 1765
» All for one or one for all
Sort
View
CORR
2010
Springer
179views Education» more  CORR 2010»
13 years 5 months ago
The DMM bound: multivariate (aggregate) separation bounds
In this paper we derive aggregate separation bounds, named after Davenport-MahlerMignotte (DMM), on the isolated roots of polynomial systems, specifically on the minimum distance ...
Ioannis Z. Emiris, Bernard Mourrain, Elias P. Tsig...
EUROMED
2010
13 years 5 months ago
Capture and Processing of High Resolution 3D-Data of Sutra Inscriptions in China
Modern high resolution 3D-measuring techniques are widely used in quality control and industrial production, because they allow precise and reliable inspection of objects. Their po...
Natalie Schmidt, Frank Boochs, Rainer Schütze
IJESMA
2010
136views more  IJESMA 2010»
13 years 4 months ago
Understanding Shared Services: An Exploration of the IS Literature
In a competitive environment, companies continuously innovate to offer superior services at lower costs. `Shared services' have been extensively adopted in practice as one me...
Suraya Miskon, Wasana Bandara, Erwin Fielt, Guy G....
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
BIB
2011
13 years 2 months ago
Mutational analysis in RNAs: comparing programs for RNA deleterious mutation prediction
Programs for RNA mutational analysis that are structure-based and rely on secondary structure prediction have been developed and expanded in the past several years. They can be us...
Danny Barash, Alexander Churkin
« Prev « First page 1746 / 1765 Last » Next »