Sciweavers

192 search results - page 37 / 39
» A Multiplicative Weights Mechanism for Privacy-Preserving Da...
Sort
View
COMCOM
2007
95views more  COMCOM 2007»
13 years 6 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
ALMOB
2006
155views more  ALMOB 2006»
13 years 6 months ago
A phylogenetic generalized hidden Markov model for predicting alternatively spliced exons
Background: An important challenge in eukaryotic gene prediction is accurate identification of alternatively spliced exons. Functional transcripts can go undetected in gene expres...
Jonathan E. Allen, Steven L. Salzberg
WWW
2008
ACM
14 years 7 months ago
Online auctions efficiency: a survey of ebay auctions
Online auctions have become a pervasive transaction mechanism for e-commerce. As the largest online marketplace in the world, eBay is an attractive case study that enables the stu...
Wenyan Hu, Alvaro Bolivar
WSE
2002
IEEE
13 years 11 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
SIGSOFT
2007
ACM
14 years 7 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek