Sciweavers

86 search results - page 17 / 18
» Impossibility Results for Secret Establishment
Sort
View
ACSAC
2002
IEEE
13 years 10 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
KDD
2000
ACM
149views Data Mining» more  KDD 2000»
13 years 9 months ago
Efficient clustering of high-dimensional data sets with application to reference matching
Many important problems involve clustering large datasets. Although naive implementations of clustering are computationally expensive, there are established efficient techniques f...
Andrew McCallum, Kamal Nigam, Lyle H. Ungar
TIT
2002
63views more  TIT 2002»
13 years 5 months ago
Structured unitary space-time autocoding constellations
We recently showed that arbitrarily reliable communication is possible within a single coherence interval in Rayleigh flat fading as the symbol-duration of the coherence interval ...
Thomas L. Marzetta, Babak Hassibi, Bertrand M. Hoc...
EDOC
2011
IEEE
12 years 5 months ago
Modeling Contextual Concerns in Enterprise Architecture
Abstract—Enterprise Architecture approaches are used to provide rigorous descriptions of the organization-wide environment, manage the alignment of deployed services to the organ...
Gonçalo Antunes, José Barateiro, Chr...
BMCBI
2010
90views more  BMCBI 2010»
13 years 5 months ago
PuTmiR: A database for extracting neighboring transcription factors of human microRNAs
Background: Some of the recent investigations in systems biology have revealed the existence of a complex regulatory network between genes, microRNAs (miRNAs) and transcription fa...
Sanghamitra Bandyopadhyay, Malay Bhattacharyya