Sciweavers

2917 search results - page 514 / 584
» Satisfying Interaction Constraints
Sort
View
JOC
2006
69views more  JOC 2006»
13 years 7 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
BMCBI
2005
161views more  BMCBI 2005»
13 years 7 months ago
Non-linear mapping for exploratory data analysis in functional genomics
Background: Several supervised and unsupervised learning tools are available to classify functional genomics data. However, relatively less attention has been given to exploratory...
Francisco Azuaje, Haiying Wang, Alban Chesneau
BMCBI
2004
146views more  BMCBI 2004»
13 years 7 months ago
The InDeVal insertion/deletion evaluation tool: a program for finding target regions in DNA sequences and for aiding in sequence
Background: The program InDeVal was originally developed to help researchers find known regions of insertion/deletion activity (with the exception of isolated single-base indels) ...
Sierra D. Stoneberg Holt, Jason A. Holt
JUCS
2010
186views more  JUCS 2010»
13 years 6 months ago
Context Awareness for Collaborative Learning with Uncertainty Management
: In Collaborative Learning, groups of students work together using traditional and computer-based tools or applications. Participants are continuously moving and reorganizing in g...
Roc Messeguer, Leandro Navarro, Pedro Damiá...
PVLDB
2010
111views more  PVLDB 2010»
13 years 2 months ago
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic
The ever-increasing number of intrusions in public and commercial networks has created the need for high-speed archival solutions that continuously store streaming network data to...
Francesco Fusco, Marc Ph. Stoecklin, Michail Vlach...