Sciweavers

400 search results - page 43 / 80
» Derandomization and Distinguishing Complexity
Sort
View
PODS
2003
ACM
114views Database» more  PODS 2003»
16 years 4 months ago
An information-theoretic approach to normal forms for relational and XML data
Normalization as a way of producing good database designs is a well-understood topic. However, the same problem of distinguishing well-designed databases from poorly designed ones...
Marcelo Arenas, Leonid Libkin
BIBE
2009
IEEE
137views Bioinformatics» more  BIBE 2009»
15 years 11 months ago
Multi-Modal Registration of Embryonic Images for In Vitro Fertilization
This paper presents a robust and fully automated registration algorithm for alignment of embryonic images taken by Optical Quadrature Microscopy (OQM) and Differential Interferenc...
Chia-Ling Tsai, Su-Ching Liang, William Warger, Ch...
ICICS
2009
Springer
15 years 10 months ago
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
GLOBECOM
2008
IEEE
15 years 10 months ago
Collusion-Resistant Multi-Winner Spectrum Auction for Cognitive Radio Networks
—In order to fully utilize spectrum, auction-based dynamic spectrum allocation has become a promising approach which allows unlicensed wireless users to lease unused bands from s...
Yongle Wu, Beibei Wang, K. J. Ray Liu, T. Charles ...
HASE
2008
IEEE
15 years 10 months ago
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination
For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
Debmalya Biswas, Thomas Gazagnaire, Blaise Genest