Sciweavers

1628 search results - page 270 / 326
» Compiler Construction Using Scheme
Sort
View
TSMC
2008
102views more  TSMC 2008»
13 years 9 months ago
Context-Dependent DNA Coding With Redundancy and Introns
Abstract--Deoxyribonucleic acid (DNA) coding methods determine the meaning of a certain character in individual chromosomes by the characters surrounding it. The meaning of each ch...
Peng Xiao, Prahlad Vadakkepat, Tong Heng Lee
ICDE
2012
IEEE
343views Database» more  ICDE 2012»
12 years 16 days ago
Bi-level Locality Sensitive Hashing for k-Nearest Neighbor Computation
We present a new Bi-level LSH algorithm to perform approximate k-nearest neighbor search in high dimensional spaces. Our formulation is based on a two-level scheme. In the first ...
Jia Pan, Dinesh Manocha
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
14 years 4 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
INFOCOM
2010
IEEE
13 years 8 months ago
On Channel-Discontinuity-Constraint Routing in Wireless Networks
Multi-channel wireless networks are increasingly being employed as infrastructure networks, e.g. in metro areas. Nodes in these networks frequently employ directional antennas to ...
Swaminathan Sankararaman, Alon Efrat, Srinivasan R...
ICFP
2005
ACM
14 years 10 months ago
PolyAML: a polymorphic aspect-oriented functional programming language
This paper defines PolyAML, a typed functional, aspect-oriented programming language. The main contribution of PolyAML is the seamless integration of polymorphism, run-time type a...
Daniel S. Dantas, David Walker, Geoffrey Washburn,...