Sciweavers

7924 search results - page 1533 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
EDBT
2009
ACM
170views Database» more  EDBT 2009»
14 years 21 days ago
Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases
The classic Generalized Sequential Patterns (GSP) algorithm returns all frequent sequences present in a database. However, usually a few ones are interesting from a user's po...
Leticia I. Gómez, Alejandro A. Vaisman
GCB
2009
Springer
154views Biometrics» more  GCB 2009»
14 years 21 days ago
Comparative Identification of Differential Interactions from Trajectories of Dynamic Biological Networks
Abstract: It is often challenging to reconstruct accurately a complete dynamic biological network due to the scarcity of data collected in cost-effective experiments. This paper ad...
Zhengyu Ouyang, Mingzhou Song
ACSC
2004
IEEE
14 years 17 days ago
Visually Sealed and Digitally Signed Documents
One of the primary flaws with current digital signature technology is that a digital signature does not "feel" or resemble a traditional seal or personal signature to th...
Vicky Liu, William J. Caelli, Ernest Foo, Selwyn R...
CGO
2004
IEEE
14 years 17 days ago
A Dynamically Tuned Sorting Library
Empirical search is a strategy used during the installation of library generators such as ATLAS, FFTW, and SPIRAL to identify the algorithm or the version of an algorithm that del...
Xiaoming Li, María Jesús Garzar&aacu...
COCO
2004
Springer
185views Algorithms» more  COCO 2004»
14 years 17 days ago
Limitations of Quantum Advice and One-Way Communication
Abstract: Although a quantum state requires exponentially many classical bits to describe, the laws of quantum mechanics impose severe restrictions on how that state can be accesse...
Scott Aaronson
« Prev « First page 1533 / 1585 Last » Next »