Sciweavers

1136 search results - page 69 / 228
» Finding Small Holes
Sort
View
RECOMB
2004
Springer
14 years 9 months ago
Chromosomal breakpoint re-use in the inference of genome sequence rearrangement
In order to apply gene-order rearrangement algorithms to the comparison of genome sequences, Pevzner and Tesler [9] bypass gene finding and ortholog identification, and use the or...
David Sankoff, Phil Trinh
PODS
2005
ACM
131views Database» more  PODS 2005»
14 years 9 months ago
Space efficient mining of multigraph streams
The challenge of monitoring massive amounts of data generated by communication networks has led to the interest in data stream processing. We study streams of edges in massive com...
Graham Cormode, S. Muthukrishnan
ACSAC
2009
IEEE
14 years 3 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
FDG
2009
ACM
14 years 3 months ago
Questioning video games' influence on CS interest
In this paper, we examine the relationship between digital games and interest in computer science. When we undertook this research, our goal was to expand upon past work that expl...
Betsy James DiSalvo, Amy Bruckman
IWPC
2008
IEEE
14 years 3 months ago
What's a Typical Commit? A Characterization of Open Source Software Repositories
The research examines the version histories of nine open source software systems to uncover trends and characteristics of how developers commit source code to version control syst...
Abdulkareem Alali, Huzefa H. Kagdi, Jonathan I. Ma...