Sciweavers

11565 search results - page 2230 / 2313
» Computing Minimal Mappings
Sort
View
ISBRA
2010
Springer
13 years 6 months ago
A Consensus Tree Approach for Reconstructing Human Evolutionary History and Detecting Population Substructure
The random accumulation of variations in the human genome over time implicitly encodes a history of how human populations have arisen, dispersed, and intermixed since we emerged as...
Ming-Chi Tsai, Guy E. Blelloch, R. Ravi, Russell S...
TFS
2008
153views more  TFS 2008»
13 years 6 months ago
Encoding Words Into Interval Type-2 Fuzzy Sets Using an Interval Approach
This paper presents a very practical type-2-fuzzistics methodology for obtaining interval type-2 fuzzy set (IT2 FS) models for words, one that is called an interval approach (IA). ...
Feilong Liu, Jerry M. Mendel
JNS
2010
98views more  JNS 2010»
13 years 6 months ago
Analysis of a General Family of Regularized Navier-Stokes and MHD Models
ABSTRACT. We consider a general family of regularized Navier-Stokes and Magnetohydrodynamics (MHD) models on n-dimensional smooth compact Riemannian manifolds with or without bound...
Michael Holst, Evelyn Lunasin, Gantumur Tsogtgerel
MICRO
2010
IEEE
156views Hardware» more  MICRO 2010»
13 years 6 months ago
Explicit Communication and Synchronization in SARC
SARC merges cache controller and network interface functions by relying on a single hardware primitive: each access checks the tag and the state of the addressed line for possible...
Manolis Katevenis, Vassilis Papaefstathiou, Stamat...
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 6 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
« Prev « First page 2230 / 2313 Last » Next »