Sciweavers

2206 search results - page 372 / 442
» On the power of coercion abstraction
Sort
View
RECOMB
2011
Springer
12 years 10 months ago
Haplotype Reconstruction in Large Pedigrees with Many Untyped Individuals
Abstract. Haplotypes, as they specify the linkage patterns between dispersed genetic variations, provide important information for understanding the genetics of human traits. Howev...
Xin Li, Jing Li
ATVA
2011
Springer
213views Hardware» more  ATVA 2011»
12 years 7 months ago
Max and Sum Semantics for Alternating Weighted Automata
Abstract. In the traditional Boolean setting of formal verification, alternating automata are the key to many algorithms and tools. In this setting, the correspondence between dis...
Shaull Almagor, Orna Kupferman
CMS
2011
229views Communications» more  CMS 2011»
12 years 7 months ago
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version)
Abstract. Cloud computing promises a cost effective enabling technology to outsource storage and massively parallel computations. However, existing approaches for provably secure ...
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sa...
EMMCVPR
2011
Springer
12 years 7 months ago
Discrete Optimization of the Multiphase Piecewise Constant Mumford-Shah Functional
Abstract. The Mumford-Shah model has been one of the most powerful models in image segmentation and denoising. The optimization of the multiphase Mumford-Shah energy functional has...
Noha Youssry El-Zehiry, Leo Grady
ESORICS
2011
Springer
12 years 7 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao