Sciweavers

1818 search results - page 264 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
120
Voted
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
15 years 4 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
146
Voted
IM
1997
15 years 4 months ago
Switchlets and Dynamic Virtual ATM Networks
This paper presents a novel approach to the control and management of ATM networks, by allowing di erent control architectures to be operational within the same network, and on th...
Jacobus E. van der Merwe, Ian M. Leslie
152
Voted
BMCBI
2007
227views more  BMCBI 2007»
15 years 3 months ago
Growing functional modules from a seed protein via integration of protein interaction and gene expression data
Background: Nowadays modern biology aims at unravelling the strands of complex biological structures such as the protein-protein interaction (PPI) networks. A key concept in the o...
Ioannis A. Maraziotis, Konstantina Dimitrakopoulou...
109
Voted
ACS
2006
15 years 3 months ago
Universality of Coproducts in Categories of Lax Algebras
Abstract. Categories of lax (T, V )-algebras are shown to have pullbackstable coproducts if T preserves inverse images. The general result not only gives a common proof of this pro...
Mojgan Mahmoudi, Christoph Schubert, Walter Tholen
BMCBI
2006
94views more  BMCBI 2006»
15 years 3 months ago
Fly-DPI: database of protein interactomes for D. melanogaster in the approach of systems biology
Background: Proteins control and mediate many biological activities of cells by interacting with other protein partners. This work presents a statistical model to predict protein ...
Chung-Yen Lin, Shu-Hwa Chen, Chi-Shiang Cho, Chia-...