Sciweavers

9382 search results - page 1702 / 1877
» A Functional Model for Data Analysis
Sort
View
JODI
2010
115views more  JODI 2010»
14 years 11 months ago
ICE-Theorem - End to end semantically aware eResearch infrastructure for theses
: ICE-TheOREM was a project which made several important contributions to the repository domain, promoting deposit by integrating the repository with authoring workflows and enhanc...
Peter Sefton, Jim Downing
TSP
2010
14 years 11 months ago
Channel energy based estimation of target trajectories using distributed sensors with low communication rate
Abstract--Sensor localization using channel energy measurements of distributed sensors has been studied in various scenarios. However, it is usually assumed that the target does no...
Christian R. Berger, Sora Choi, Shengli Zhou, Pete...
STOC
2009
ACM
167views Algorithms» more  STOC 2009»
16 years 5 months ago
Universally utility-maximizing privacy mechanisms
A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Publishing fully accurate information ...
Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan
RECOMB
2006
Springer
16 years 5 months ago
Genome-Wide Discovery of Modulators of Transcriptional Interactions in Human B Lymphocytes
Abstract. Transcriptional interactions in a cell are modulated by a variety of mechanisms that prevent their representation as pure pairwise interactions between a transcription fa...
Kai Wang, Ilya Nemenman, Nilanjana Banerjee, Adam ...
153
Voted
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
« Prev « First page 1702 / 1877 Last » Next »