Sciweavers

4762 search results - page 708 / 953
» About the use of protein models
Sort
View
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
16 years 1 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
PODS
2008
ACM
174views Database» more  PODS 2008»
16 years 1 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
CCS
2009
ACM
15 years 8 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
CIKM
2007
Springer
15 years 7 months ago
Opinion retrieval from blogs
Opinion retrieval is a document retrieval process, which requires documents to be retrieved and ranked according to their opinions about a query topic. A relevant document must sa...
Wei Zhang, Clement T. Yu, Weiyi Meng
ISPAN
2005
IEEE
15 years 7 months ago
A Self-stabilizing Link-Cluster Algorithm in Mobile Ad Hoc Networks
We design a self-stabilizing cluster routing algorithm based on the link-cluster architecture of wireless ad hoc networks. The network is divided into clusters. Each cluster has a...
Doina Bein, Ajoy Kumar Datta, Chakradhar R. Jaggan...