Sciweavers

928 search results - page 49 / 186
» The degree structure of Weihrauch-reducibility
Sort
View
SP
2009
IEEE
14 years 3 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
ISSAC
2009
Springer
184views Mathematics» more  ISSAC 2009»
14 years 3 months ago
An iterative method for calculating approximate GCD of univariate polynomials
We present an iterative algorithm for calculating approximate greatest common divisor (GCD) of univariate polynomials with the real coefficients. For a given pair of polynomials a...
Akira Terui
HPCC
2007
Springer
14 years 3 months ago
On Pancyclicity Properties of OTIS Networks
The OTIS-Network (also referred to as two-level swapped network) is composed of n clones of an n-node original network constituting its clusters. It has received much attention due...
Mohammad R. Hoseinyfarahabady, Hamid Sarbazi-Azad
IFSA
2007
Springer
133views Fuzzy Logic» more  IFSA 2007»
14 years 3 months ago
Fuzzy Tree Mining: Go Soft on Your Nodes
Tree mining consists in discovering the frequent subtrees from a forest of trees. This problem has many application areas. For instance, a huge volume of data available from the In...
Federico Del Razo López, Anne Laurent, Pasc...
PERVASIVE
2007
Springer
14 years 3 months ago
TrackSense: Infrastructure Free Precise Indoor Positioning Using Projected Patterns
While commercial solutions for precise indoor positioning exist, they are costly and require installation of additional infrastructure, which limits opportunities for widespread ad...
Moritz Köhler, Shwetak N. Patel, Jay Summet, ...