Algorithms

Results: 10964



#Item
31

A comparison of the Oligomap and TargetScan algorithms for miRNA target analysis Badreddin Edris BIOC 218 Final Project (Win-09) Stanford University Introduction

Add to Reading List

Source URL: biochem218.stanford.edu

Language: English - Date: 2009-03-22 03:15:15
    32

    Representation Theory 16Gxx [1] Alexander Chistov, G´abor Ivanyos, and Marek Karpinski, Polynomial time algorithms for modules over finite dimensional algebras, Proceedings of the 1997 International Symposium on Symboli

    Add to Reading List

    Source URL: magma.maths.usyd.edu.au

    Language: English
      33

      Streaming algorithms! (an introduction)! Frédéric Magniez! LIAFA, CNRS, Université Paris Diderot Data access model

      Add to Reading List

      Source URL: www.irif.fr

      Language: English - Date: 2017-10-25 10:04:25
        34

        Outline CS38 Introduction to Algorithms Lecture 2 April 3, 2014

        Add to Reading List

        Source URL: users.cms.caltech.edu

        Language: English - Date: 2014-04-04 17:02:09
          35

          Space-efficient Local Computation Algorithms Noga Alon∗ Ronitt Rubinfeld† Shai Vardi ‡

          Add to Reading List

          Source URL: www.shaivardi.com

          Language: English - Date: 2016-11-07 02:11:23
            36

            Functional Safety Aspects of Pattern Detection Algorithms Joachim Iden1 and Christian Penaloza2 Abstract— Pattern detection algorithms may be used as part of safety-relevant processes employed by industrial systems. Cu

            Add to Reading List

            Source URL: www.christian-penaloza.com

            Language: English - Date: 2014-12-17 19:32:11
              37

              Computer Science Fundamental Algorithms Ali Sharifi and Behdad Esfahbod Sharif University of Technology Tehran, Iran 2001

              Add to Reading List

              Source URL: behdad.org

              Language: English - Date: 2012-12-09 20:35:56
                38

                July 31, 2002 To appear in J. of DEDS LEAST SQUARES POLICY EVALUATION ALGORITHMS WITH LINEAR FUNCTION APPROXIMATION1

                Add to Reading List

                Source URL: www.ifp.illinois.edu

                Language: English - Date: 2006-11-13 17:37:24
                  39

                  TEMPEST attacks against AES Covertly stealing keys for €200 Overview Side-channel attacks can recover secret keys from cryptographic algorithms (including the pervasive AES) using measurements such as power use. Howeve

                  Add to Reading List

                  Source URL: www.fox-it.com

                  Language: English - Date: 2018-04-20 09:19:48
                    40

                    LNCSTimed Automata: Semantics, Algorithms and Tools

                    Add to Reading List

                    Source URL: user.it.uu.se

                    Language: English - Date: 2013-03-05 14:46:54
                      UPDATE