Sciweavers

27827 search results - page 5481 / 5566
» Generating
Sort
View
206
Voted
BIBM
2010
IEEE
286views Bioinformatics» more  BIBM 2010»
15 years 20 days ago
Evaluation of short read metagenomic assembly
Advances in sequencing technologies have equipped researchers with the ability to sequence the collective genome of entire microbial communities commonly referred to as metagenomi...
Anveshi Charuvaka, Huzefa Rangwala
123
Voted
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
15 years 20 days ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
144
Voted
CASCON
2010
174views Education» more  CASCON 2010»
15 years 20 days ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
156
Voted
CIKM
2010
Springer
15 years 20 days ago
Automatic schema merging using mapping constraints among incomplete sources
Schema merging is the process of consolidating multiple schemas into a unified view. The task becomes particularly challenging when the schemas are highly heterogeneous and autono...
Xiang Li 0002, Christoph Quix, David Kensche, Sand...
249
Voted
CIKM
2010
Springer
15 years 20 days ago
Mining topic-level influence in heterogeneous networks
Influence is a complex and subtle force that governs the dynamics of social networks as well as the behaviors of involved users. Understanding influence can benefit various applic...
Lu Liu, Jie Tang, Jiawei Han, Meng Jiang, Shiqiang...
« Prev « First page 5481 / 5566 Last » Next »