Sciweavers

9186 search results - page 1519 / 1838
» A Module System for Scheme
Sort
View
125
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
105
Voted
CCS
2009
ACM
15 years 10 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
112
Voted
ICS
2009
Tsinghua U.
15 years 10 months ago
Dynamic cache clustering for chip multiprocessors
This paper proposes DCC (Dynamic Cache Clustering), a novel distributed cache management scheme for large-scale chip multiprocessors. Using DCC, a per-core cache cluster is compri...
Mohammad Hammoud, Sangyeun Cho, Rami G. Melhem
125
Voted
KDD
2009
ACM
183views Data Mining» more  KDD 2009»
15 years 10 months ago
Financial incentives and the "performance of crowds"
The relationship between financial incentives and performance, long of interest to social scientists, has gained new relevance with the advent of web-based “crowd-sourcing” mo...
Winter A. Mason, Duncan J. Watts
MCS
2009
Springer
15 years 10 months ago
Ensemble Based Data Fusion for Gene Function Prediction
The availability of an ever increasing amount of data sources due to recent advances in high throughput biotechnologies opens unprecedented opportunities for genome-wide gene funct...
Matteo Re, Giorgio Valentini
« Prev « First page 1519 / 1838 Last » Next »