Sciweavers

1026 search results - page 123 / 206
» On Finding Minimal w-cutset
Sort
View
JWSR
2008
147views more  JWSR 2008»
13 years 10 months ago
Karma2: Provenance Management for Data-Driven Workflows
: The increasing ability for the sciences to sense the world around us is resulting in a growing need for data driven applications that are under the control of workflows composed ...
Yogesh L. Simmhan, Beth Plale, Dennis Gannon
TCAD
2008
106views more  TCAD 2008»
13 years 10 months ago
Track Routing and Optimization for Yield
Abstract--In this paper, we propose track routing and optimization for yield (TROY), the first track router for the optimization of yield loss due to random defects. As the probabi...
Minsik Cho, Hua Xiang, Ruchir Puri, David Z. Pan
BMCBI
2005
63views more  BMCBI 2005»
13 years 10 months ago
Individual sequences in large sets of gene sequences may be distinguished efficiently by combinations of shared sub-sequences
Background: Most current DNA diagnostic tests for identifying organisms use specific oligonucleotide probes that are complementary in sequence to, and hence only hybridise with th...
Mark J. Gibbs, John S. Armstrong, Adrian J. Gibbs
TRS
2008
13 years 10 months ago
Local and Global Approximations for Incomplete Data
Abstract. For completely specified decision tables lower and upper approximations are unique, the lower approximation is the largest definable set contained in the approximated set...
Jerzy W. Grzymala-Busse, Wojciech Rzasa
CCS
2008
ACM
14 years 6 days ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett