Sciweavers

1041 search results - page 184 / 209
» Two Algorithms for Inducing Causal Models from Data
Sort
View
DASFAA
2011
IEEE
250views Database» more  DASFAA 2011»
13 years 7 days ago
An FTL-Agnostic Layer to Improve Random Write on Flash Memory
Flash memories are considered a competitive alternative to rotating disks as non-volatile data storage for database management systems. However, even if the Flash Translation Layer...
Brice Chardin, Olivier Pasteur, Jean-Marc Petit
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 8 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
CORR
2011
Springer
235views Education» more  CORR 2011»
13 years 3 months ago
On the accuracy of language trees
Historical linguistics aims at inferring the most likely language phylogenetic tree starting from information concerning the evolutionary relatedness of languages. The available i...
Simone Pompei, Vittorio Loreto, Francesca Tria
CSB
2004
IEEE
131views Bioinformatics» more  CSB 2004»
14 years 6 days ago
Improved Fourier Transform Method for Unsupervised Cell-Cycle Regulated Gene Prediction
Motivation: Cell-cycle regulated gene prediction using microarray time-course measurements of the mRNA expression levels of genes has been used by several researchers. The popular...
Karuturi R. Krishna Murthy, Liu Jian Hua
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
14 years 6 days ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...