Sciweavers

464 search results - page 89 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
VLDB
2009
ACM
147views Database» more  VLDB 2009»
15 years 9 months ago
Privacy-preserving indexing of documents on the network
We address the problem of providing privacypreserving search over distributed accesscontrolled content. Indexed documents can be easily reconstructed from conventional (inverted) ...
Mayank Bawa, Rakesh Agrawal, Roberto J. Bayardo Jr...
MLDM
2009
Springer
15 years 4 months ago
Memory-Based Modeling of Seasonality for Prediction of Climatic Time Series
The paper describes a method for predicting climate time series that consist of significant annual and diurnal seasonal components and a short-term stockastic component. A memory...
Daniel Nikovski, Ganesan Ramachandran
IJPP
2002
107views more  IJPP 2002»
14 years 9 months ago
Efficiently Adapting Java Binaries in Limited Memory Contexts
This paper presents a compilation framework that allows executable code to be shared across different Java Virtual Machine (JVM) instances. All fully compliant JVMs that target se...
Pramod G. Joisha, Samuel P. Midkiff, Mauricio J. S...
BMCBI
2007
133views more  BMCBI 2007»
14 years 9 months ago
GenMAPP 2: new features and resources for pathway analysis
Background: Microarray technologies have evolved rapidly, enabling biologists to quantify genome-wide levels of gene expression, alternative splicing, and sequence variations for ...
Nathan Salomonis, Kristina Hanspers, Alexander C. ...
ACMDIS
2006
ACM
15 years 3 months ago
External representations in ubiquitous computing design and the implications for design tools
One challenge for ubiquitous computing is providing appropriate tools for professional designers, thus leading to stronger user-valued applications. Unlike many previous tool-buil...
Steven Dow, T. Scott Saponas, Yang Li, James A. La...