Sciweavers

11565 search results - page 2230 / 2313
» Computing Minimal Mappings
Sort
View
166
Voted
ISBRA
2010
Springer
15 years 1 months ago
A Consensus Tree Approach for Reconstructing Human Evolutionary History and Detecting Population Substructure
The random accumulation of variations in the human genome over time implicitly encodes a history of how human populations have arisen, dispersed, and intermixed since we emerged as...
Ming-Chi Tsai, Guy E. Blelloch, R. Ravi, Russell S...
114
Voted
TFS
2008
153views more  TFS 2008»
15 years 1 months ago
Encoding Words Into Interval Type-2 Fuzzy Sets Using an Interval Approach
This paper presents a very practical type-2-fuzzistics methodology for obtaining interval type-2 fuzzy set (IT2 FS) models for words, one that is called an interval approach (IA). ...
Feilong Liu, Jerry M. Mendel
96
Voted
JNS
2010
98views more  JNS 2010»
15 years 1 months ago
Analysis of a General Family of Regularized Navier-Stokes and MHD Models
ABSTRACT. We consider a general family of regularized Navier-Stokes and Magnetohydrodynamics (MHD) models on n-dimensional smooth compact Riemannian manifolds with or without bound...
Michael Holst, Evelyn Lunasin, Gantumur Tsogtgerel
149
Voted
MICRO
2010
IEEE
156views Hardware» more  MICRO 2010»
15 years 1 months ago
Explicit Communication and Synchronization in SARC
SARC merges cache controller and network interface functions by relying on a single hardware primitive: each access checks the tag and the state of the addressed line for possible...
Manolis Katevenis, Vassilis Papaefstathiou, Stamat...
SCN
2010
Springer
144views Communications» more  SCN 2010»
15 years 1 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
« Prev « First page 2230 / 2313 Last » Next »