Sciweavers

154 search results - page 29 / 31
» Computing universal models under guarded TGDs
Sort
View
BMCBI
2004
151views more  BMCBI 2004»
13 years 9 months ago
Design, implementation and evaluation of a practical pseudoknot folding algorithm based on thermodynamics
Background: The general problem of RNA secondary structure prediction under the widely used thermodynamic model is known to be NP-complete when the structures considered include a...
Jens Reeder, Robert Giegerich
PODC
2009
ACM
14 years 10 months ago
Oblivious interference scheduling
In the interference scheduling problem, one is given a set of n communication requests described by pairs of points from a metric space. The points correspond to devices in a wire...
Alexander Fanghänel, Berthold Vöcking, H...
RT
2004
Springer
14 years 3 months ago
PointWorks: Abstraction and Rendering of Sparsely Scanned Outdoor Environments
ks: Abstraction and Rendering of Sparsely Scanned Outdoor Environments Hui Xu, Nathan Gossett and Baoquan Chen University of Minnesota Digital Technology Center at Twin Cities † ...
Hui Xu, Nathan Gossett, Baoquan Chen
ECAL
1995
Springer
14 years 1 months ago
Elements of a Theory of Simulation
Arti cial Life and the more general area of Complex Systems does not have a uni ed theoretical framework although most theoretical work in these areas is based on simulation. This ...
Steen Rasmussen, Christopher L. Barrett
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev