Sciweavers

140 search results - page 26 / 28
» List Factoring and Relative Worst Order Analysis
Sort
View
ICALP
2005
Springer
14 years 27 days ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
CSCW
2004
ACM
14 years 24 days ago
Capturing and supporting contexts for scientific data sharing via the biological sciences collaboratory
Scientific collaboration is largely focused on the sharing and joint analysis of scientific data and results. Today, a movement is afoot within the scientific computing community ...
George Chin Jr., Carina Lansing
CSCW
2004
ACM
14 years 24 days ago
Territoriality in collaborative tabletop workspaces
Researchers seeking alternatives to traditional desktop computers have begun exploring the potential collaborative benefits of digital tabletop displays. However, there are still ...
Stacey D. Scott, M. Sheelagh T. Carpendale, Kori M...
BMCBI
2010
118views more  BMCBI 2010»
13 years 7 months ago
svdPPCS: an effective singular value decomposition-based method for conserved and divergent co-expression gene module identifica
Background: Comparative analysis of gene expression profiling of multiple biological categories, such as different species of organisms or different kinds of tissue, promises to e...
Wensheng Zhang, Andrea Edwards, Wei Fan, Dongxiao ...
JKM
2010
131views more  JKM 2010»
13 years 5 months ago
Beyond the ba: managing enabling contexts in knowledge organizations
Purpose – Looking at the practical experience of organizations pursuing knowledge management, it is found that their efforts are primarily focused on creating the conditions and...
Chun Wei Choo, Rivadávia Correa Drummond de...