As memory transactions have been proposed as a language-level replacement for locks, there is growing need for well-defined semantics. In contrast to database transactions, transa...
Vijay Menon, Steven Balensiefer, Tatiana Shpeisman...
We describe a compression model for semistructured documents, called Structural Contexts Model (SCM), which takes advantage of the context information usually implicit in the stru...
At the first international Visualization Summit, more than 100 international researchers and practitioners defined and assessed nine original and important research goals in the c...
Remo Aslak Burkhard, Gennady L. Andrienko, Natalia...
We investigate the decoding problem of Reed-Solomon (RS) Codes, also known as the Polynomial Reconstruction Problem (PR), from a cryptographic hardness perspective. Namely, we dea...
Background: Cluster analyses are used to analyze microarray time-course data for gene discovery and pattern recognition. However, in general, these methods do not take advantage o...
Hua Liu, Sergey Tarima, Aaron S. Borders, Thomas V...