Sciweavers

125 search results - page 25 / 25
» micro 2010
Sort
View
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
13 years 8 months ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
ESEM
2010
ACM
13 years 4 months ago
Object oriented design pattern decay: a taxonomy
Software designs decay over time. While most studies focus on decay at the system level, this research studies design decay on well understood micro architectures, design patterns...
Travis Schanz, Clemente Izurieta
18
Voted
CLOUDCOM
2010
Springer
13 years 2 months ago
Efficient Metadata Generation to Enable Interactive Data Discovery over Large-Scale Scientific Data Collections
Discovering the correct dataset efficiently is critical for computations and effective simulations in scientific experiments. In contrast to searching web documents over the Intern...
Sangmi Lee Pallickara, Shrideep Pallickara, Milija...
SENSYS
2010
ACM
13 years 2 months ago
Enix: a lightweight dynamic operating system for tightly constrained wireless sensor platforms
Enix is a lightweight dynamic operating system for tightly constrained platforms for wireless sensor networks (WSN). Enix provides a cooperative threading model, which is applicab...
Yu-Ting Chen, Ting-Chou Chien, Pai H. Chou
BMCBI
2010
99views more  BMCBI 2010»
13 years 4 months ago
Prediction of novel precursor miRNAs using a context-sensitive hidden Markov model (CSHMM)
Background: It has been apparent in the last few years that small non coding RNAs (ncRNA) play a very significant role in biological regulation. Among these microRNAs (miRNAs), 22...
Sumeet Agarwal, Candida Vaz, Alok Bhattacharya, As...