Sciweavers

125 search results - page 19 / 25
» Linear Cryptanalysis Using Multiple Approximations
Sort
View
SIGECOM
2004
ACM
96views ECommerce» more  SIGECOM 2004»
14 years 3 months ago
Expressive negotiation over donations to charities
When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as negotiating material to induce other parties interested in the charity to dona...
Vincent Conitzer, Tuomas Sandholm
BMCBI
2008
242views more  BMCBI 2008»
13 years 10 months ago
New time-scale criteria for model simplification of bio-reaction systems
Background: Quasi-steady state approximation (QSSA) based on time-scale analysis is known to be an effective method for simplifying metabolic reaction system, but the conventional...
Junwon Choi, Kyung-won Yang, Tai-yong Lee, Sang Yu...
IPPS
2003
IEEE
14 years 3 months ago
On Self-Similarity and Hamiltonicity of Dual-Cubes
The dual-cube is a newly proposed topology for interconnection networks, which uses low dimensional hypercubes as building blocks. The primary advantages of the dual-cube over the...
Changfu Wu, Jie Wu
ISBI
2007
IEEE
14 years 4 months ago
Molecular Tomographic Imaging of Lymph Nodes with Nir Fluorescence
This contribution describes a system and method for tomographically imaging lymph nodes marked with a lymph endothelium targeting fluorescence reporter. A novel scanning NIR lase...
Amit Joshi, Wolfgang Bangerth, Ruchi Sharma, John ...
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
14 years 2 months ago
ERACER: a database approach for statistical inference and data cleaning
Real-world databases often contain syntactic and semantic errors, in spite of integrity constraints and other safety measures incorporated into modern DBMSs. We present ERACER, an...
Chris Mayfield, Jennifer Neville, Sunil Prabhakar