Sciweavers

4190 search results - page 834 / 838
» Type Class Directives
Sort
View
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
BMCBI
2011
13 years 2 months ago
Taxon ordering in phylogenetic trees: a workbench test
Background: Phylogenetic trees are an important tool for representing evolutionary relationships among organisms. In a phylogram or chronogram, the ordering of taxa is not conside...
Francesco Cerutti, Luigi Bertolotti, Tony L. Goldb...
IJAHUC
2010
145views more  IJAHUC 2010»
13 years 2 months ago
Towards a routing framework in ad hoc space networks
Abstract: The unique characteristics of space networks lead to different research approaches from those in terrestrial networks. In this paper, a routing framework called Space Gat...
Chao Chen, Zesheng Chen
JMLR
2010
165views more  JMLR 2010»
13 years 2 months ago
Causal Inference
: This review presents empirical researchers with recent advances in causal inference, and stresses the paradigmatic shifts that must be undertaken in moving from traditional stati...
Judea Pearl
PVLDB
2010
139views more  PVLDB 2010»
13 years 2 months ago
Identifying the Most Influential Data Objects with Reverse Top-k Queries
Top-k queries are widely applied for retrieving a ranked set of the k most interesting objects based on the individual user preferences. As an example, in online marketplaces, cus...
Akrivi Vlachou, Christos Doulkeridis, Kjetil N&osl...