Sciweavers

88 search results - page 18 / 18
» Public Key Encryption with Keyword Search
Sort
View
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 3 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
BMCBI
2010
135views more  BMCBI 2010»
13 years 5 months ago
Integration and visualization of systems biology data in context of the genome
Background: High-density tiling arrays and new sequencing technologies are generating rapidly increasing volumes of transcriptome and protein-DNA interaction data. Visualization a...
J. Christopher Bare, Tie Koide, David J. Reiss, Da...
HPDC
2010
IEEE
13 years 6 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim