Sciweavers

214 search results - page 41 / 43
» Perfect and Almost Perfect Sequences
Sort
View
144
Voted
BMCBI
2007
99views more  BMCBI 2007»
15 years 3 months ago
Towards validating the hypothesis of phylogenetic profiling
Background: As the number of fully sequenced genome increases, the need is greater for bioinformatics to predict or annotate genes of a newly sequenced genome. Ever since Eisenber...
Raja Loganantharaj, Mazen Atwi
158
Voted
SIAMCOMP
2000
161views more  SIAMCOMP 2000»
15 years 3 months ago
Application-Controlled Paging for a Shared Cache
We propose a provably efficient application-controlled global strategy for organizing a cache of size k shared among P application processes. Each application has access to informa...
Rakesh D. Barve, Edward F. Grove, Jeffrey Scott Vi...
140
Voted
STOC
2006
ACM
108views Algorithms» more  STOC 2006»
16 years 3 months ago
Gowers uniformity, influence of variables, and PCPs
Gowers [Gow98, Gow01] introduced, for d 1, the notion of dimension-d uniformity Ud (f) of a function f : G C, where G is a finite abelian group. Roughly speaking, if a function ...
Alex Samorodnitsky, Luca Trevisan
PODC
2011
ACM
14 years 6 months ago
Structuring unreliable radio networks
In this paper we study the problem of building a connected dominating set with constant degree (CCDS) in the dual graph radio network model [4,9,10]. This model includes two types...
Keren Censor-Hillel, Seth Gilbert, Fabian Kuhn, Na...
153
Voted
TCC
2004
Springer
164views Cryptology» more  TCC 2004»
15 years 9 months ago
Hierarchical Threshold Secret Sharing
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is shared among a group of participants that is partitioned ...
Tamir Tassa