Sciweavers

2165 search results - page 417 / 433
» cases 2005
Sort
View
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
14 years 6 days ago
Characterizing Ideal Weighted Threshold Secret Sharing
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user is assigned a positive w...
Amos Beimel, Tamir Tassa, Enav Weinreb
TLCA
2005
Springer
14 years 6 days ago
Recursive Functions with Higher Order Domains
In a series of articles, we developed a method to translate general recursive functions written in a functional programming style into constructive type theory. Three problems rema...
Ana Bove, Venanzio Capretta
UML
2005
Springer
14 years 6 days ago
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques
Abstract. Aspect-Oriented Modeling (AOM) techniques allow software designers to isolate and address separately solutions for crosscutting concerns (such as security, reliability, n...
Hui Shen, Dorina C. Petriu
WABI
2005
Springer
120views Bioinformatics» more  WABI 2005»
14 years 6 days ago
Multiple Structural RNA Alignment with Lagrangian Relaxation
In contrast to proteins, many classes of functionally related RNA molecules show a rather weak sequence conservation but instead a fairly well conserved secondary structure. Hence ...
Markus Bauer, Gunnar W. Klau, Knut Reinert
WAOA
2005
Springer
177views Algorithms» more  WAOA 2005»
14 years 6 days ago
Approximation and Complexity of k-Splittable Flows
Given a graph with a source and a sink node, the NP–hard maximum k–splittable flow (MkSF) problem is to find a flow of maximum value with a flow decomposition using at most...
Ronald Koch, Martin Skutella, Ines Spenke