Sciweavers

352 search results - page 12 / 71
» Problem section
Sort
View
ACSAC
2001
IEEE
14 years 1 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
CORR
2000
Springer
149views Education» more  CORR 2000»
13 years 9 months ago
On The Closest String and Substring Problems
Abstract. The problem of finding a center string that is "close" to every given string arises in computational molecular biology and coding theory. This problem has two v...
Ming Li, Bin Ma, Lusheng Wang
CF
2010
ACM
14 years 2 months ago
Proposition for a sequential accelerator in future general-purpose manycore processors and the problem of migration-induced cach
As the number of transistors on a chip doubles with every technology generation, the number of on-chip cores also increases rapidly, making possible in a foreseeable future to des...
Pierre Michaud, Yiannakis Sazeides, André S...
BMCBI
2008
125views more  BMCBI 2008»
13 years 9 months ago
A fast algorithm for the multiple genome rearrangement problem with weighted reversals and transpositions
Background: Due to recent progress in genome sequencing, more and more data for phylogenetic reconstruction based on rearrangement distances between genomes become available. Howe...
Martin Bader, Mohamed Ibrahim Abouelhoda, Enno Ohl...
IROS
2008
IEEE
136views Robotics» more  IROS 2008»
14 years 4 months ago
A geometrical approach to inverse kinematics for continuum manipulators
—We present a new geometrical approach to solving inverse kinematics for continuous backbone (continuum) robot manipulators. First, this paper presents a solution to the inverse ...
Srinivas Neppalli, Matthew A. Csencsits, Bryan A. ...