Sciweavers

530 search results - page 71 / 106
» Case Study of a Functional Genomics Application
Sort
View
COMPSAC
2011
IEEE
14 years 12 days ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
105
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Multi-rate peer-to-peer video conferencing: A distributed approach using scalable coding
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...
89
Voted
ICML
2005
IEEE
16 years 1 months ago
Predicting probability distributions for surf height using an ensemble of mixture density networks
There is a range of potential applications of Machine Learning where it would be more useful to predict the probability distribution for a variable rather than simply the most lik...
Michael Carney, Padraig Cunningham, Jim Dowling, C...
107
Voted
VLDB
1998
ACM
105views Database» more  VLDB 1998»
15 years 4 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...