A large number of database index structures have been proposed over the last two decades, and little consensus has emerged regarding their relative e ectiveness. In order to empir...
Joseph M. Hellerstein, Lisa Hellerstein, George Ko...
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Previous study has shown that mining frequent patterns with length-decreasing support constraint is very helpful in removing some uninteresting patterns based on the observation t...
Background: Understanding how genes are expressed and regulated in different tissues is a fundamental and challenging question. However, most of currently available biological dat...
Xiong Liu, Xueping Yu, Donald J. Zack, Heng Zhu, J...
Background: Functional genomic studies involving high-throughput sequencing and tiling array applications, such as ChIP-seq and ChIP-chip, generate large numbers of experimentally...
Mali Salmon-Divon, Heidi Dvinge, Kairi Tammoja, Pa...