Sciweavers

3305 search results - page 571 / 661
» Can we Rely on SQL
Sort
View
EUROCRYPT
2008
Springer
13 years 10 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
SE
2008
13 years 10 months ago
TIME - Tracking Intra- and Inter-Model Evolution
Abstract: Modern software development approaches, especially the model-driven approaches, heavily rely on the use of models during the whole development process. With the increasin...
Maximilian Kögel
CONEXT
2009
ACM
13 years 10 months ago
Online optimization of 802.11 mesh networks
802.11 wireless mesh networks are ubiquitous, but suffer from severe performance degradations due to poor synergy between the 802.11 CSMA MAC protocol and higher layers. Several s...
Theodoros Salonidis, Georgios Sotiropoulos, Roch G...
BMCBI
2008
200views more  BMCBI 2008»
13 years 9 months ago
Defining functional distances over Gene Ontology
Background: A fundamental problem when trying to define the functional relationships between proteins is the difficulty in quantifying functional similarities, even when well-stru...
Angela del Pozo, Florencio Pazos, Alfonso Valencia
BMCBI
2007
165views more  BMCBI 2007»
13 years 9 months ago
Direct maximum parsimony phylogeny reconstruction from genotype data
Background: Maximum parsimony phylogenetic tree reconstruction from genetic variation data is a fundamental problem in computational genetics with many practical applications in p...
Srinath Sridhar, Fumei Lam, Guy E. Blelloch, R. Ra...