Sciweavers

331 search results - page 38 / 67
» New Results on the Pseudorandomness of Some Blockcipher Cons...
Sort
View
BMCBI
2007
115views more  BMCBI 2007»
13 years 9 months ago
Comparing sequences without using alignments: application to HIV/SIV subtyping
Background: In general, the construction of trees is based on sequence alignments. This procedure, however, leads to loss of informationwhen parts of sequence alignments (for inst...
Gilles Didier, Laurent Debomy, Maude Pupin, Ming Z...
IANDC
2010
84views more  IANDC 2010»
13 years 7 months ago
Underapproximation for model-checking based on universal circuits
For two naturals m, n such that m < n, we show how to construct a circuit C with m inputs and n outputs, that has the following property: for some 0 ≤ k ≤ m, the circuit deï...
Arie Matsliah, Ofer Strichman
ICDE
2004
IEEE
133views Database» more  ICDE 2004»
14 years 10 months ago
GenExplore: Interactive Exploration of Gene Interactions from Microarray Data
DNA Microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Yong Ye, Xintao Wu, Kalpathi R. Subramanian, Liyin...
GIR
2006
ACM
14 years 3 months ago
Inferring Geographical Ontologies from Multiple Resources for Geographical Information Retrieval
Many documents that can be found in the World Wide Web include some kind of geographical information, often in an implicit way. The use of resources like gazetteers and geographic...
Davide Buscaldi, Paolo Rosso, Piedachu Peris
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 9 months ago
Multimode Control Attacks on Elections
In 1992, Bartholdi, Tovey, and Trick [1992] opened the study of control attacks on elections--attempts to improve the election outcome by such actions as adding/deleting candidate...
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hem...