Sciweavers

828 search results - page 160 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
Improved single-round protocols for remote file synchronization
— Given two versions of a file, a current version located on one machine and an outdated version known only to another machine, the remote file synchronization problem is how t...
Utku Irmak, Svilen Mihaylov, Torsten Suel
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 9 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
BMCBI
2005
102views more  BMCBI 2005»
14 years 9 months ago
Genome-wide identification of the regulatory targets of a transcription factor using biochemical characterization and computatio
Background: A major challenge in computational genomics is the development of methodologies that allow accurate genome-wide prediction of the regulatory targets of a transcription...
Emmitt R. Jolly, Chen-Shan Chin, Ira Herskowitz, H...
CONNECTION
2006
172views more  CONNECTION 2006»
14 years 9 months ago
Temporal sequence detection with spiking neurons: towards recognizing robot language instructions
We present an approach for recognition and clustering of spatio temporal patterns based on networks of spiking neurons with active dendrites and dynamic synapses. We introduce a n...
Christo Panchev, Stefan Wermter
HPCA
2011
IEEE
14 years 1 months ago
Dynamic parallelization of JavaScript applications using an ultra-lightweight speculation mechanism
As the web becomes the platform of choice for execution of more complex applications, a growing portion of computation is handed off by developers to the client side to reduce net...
Mojtaba Mehrara, Po-Chun Hsu, Mehrzad Samadi, Scot...