Sciweavers

2421 search results - page 422 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
BMCBI
2007
154views more  BMCBI 2007»
13 years 10 months ago
Cinteny: flexible analysis and visualization of synteny and genome rearrangements in multiple organisms
Background: Identifying syntenic regions, i.e., blocks of genes or other markers with evolutionary conserved order, and quantifying evolutionary relatedness between genomes in ter...
Amit U. Sinha, Jaroslaw Meller
JSAT
2006
91views more  JSAT 2006»
13 years 10 months ago
Extending Existential Quantification in Conjunctions of BDDs
Abstract. We introduce new approaches intended to speed up determining the satisfiability of a given Boolean formula expressed as a conjunction of Boolean functions. A common prac...
Sean Weaver, John V. Franco, John S. Schlipf
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 4 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
SAT
2005
Springer
129views Hardware» more  SAT 2005»
14 years 3 months ago
On Finding All Minimally Unsatisfiable Subformulas
Much attention has been given in recent years to the problem of finding Minimally Unsatisfiable Subformulas (MUSes) of Boolean formulas. In this paper, we present a new view of the...
Mark H. Liffiton, Karem A. Sakallah
DISCEX
2003
IEEE
14 years 3 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes