Sciweavers

1687 search results - page 286 / 338
» Which pointer analysis should I use
Sort
View
BMCBI
2010
108views more  BMCBI 2010»
13 years 7 months ago
Prediction of RNA secondary structure by maximizing pseudo-expected accuracy
Background: Recent studies have revealed the importance of considering the entire distribution of possible secondary structures in RNA secondary structure predictions; therefore, ...
Michiaki Hamada, Kengo Sato, Kiyoshi Asai
ACISP
2009
Springer
14 years 4 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
VLDB
2004
ACM
111views Database» more  VLDB 2004»
14 years 3 months ago
Technology Challenges in a Data Warehouse
This presentation will discuss several database technology challenges that are faced when building a data warehouse. It will touch on the challenges posed by high capacity drives ...
Ramesh Bhashyam
CAIP
2003
Springer
133views Image Analysis» more  CAIP 2003»
14 years 3 months ago
Optimizing Eigenfaces by Face Masks for Facial Expression Recognition
A new direction in improving modern dialogue systems is to make a human-machine dialogue more similar to a human-human dialogue. This can be done by adding more input modalities. O...
Carmen Frank, Elmar Nöth
TIC
2000
Springer
137views System Software» more  TIC 2000»
14 years 1 months ago
Scalable Certification for Typed Assembly Language
Abstract. A type-based certifying compiler maps source code to machine code and target-level type annotations. The target-level annotations make it possible to prove easily that th...
Dan Grossman, J. Gregory Morrisett