Sciweavers

64 search results - page 8 / 13
» Numeric Reasoning with Relative Orders of Magnitude
Sort
View
PKC
2012
Springer
234views Cryptology» more  PKC 2012»
11 years 9 months ago
Ring-LWE in Polynomial Rings
Abstract. The Ring-LWE problem, introduced by Lyubashevsky, Peikert, and Regev (Eurocrypt 2010), has been steadily finding many uses in numerous cryptographic applications. Still,...
Léo Ducas, Alain Durmus
BMCBI
2007
129views more  BMCBI 2007»
13 years 7 months ago
Algebraic correction methods for computational assessment of clone overlaps in DNA fingerprint mapping
Background: The Sulston score is a well-established, though approximate metric for probabilistically evaluating postulated clone overlaps in DNA fingerprint mapping. It is known t...
Michael C. Wendl
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
14 years 1 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
VLDB
2007
ACM
96views Database» more  VLDB 2007»
14 years 1 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...
NMR
2004
Springer
14 years 10 days ago
A SAT-based polynomial space algorithm for answer set programming
The relation between answer set programming (ASP) and propositional satisfiability (SAT) is at the center of many research papers, partly because of the tremendous performance bo...
Enrico Giunchiglia, Yuliya Lierler, Marco Maratea