Sciweavers

2610 search results - page 470 / 522
» Computational Probabilistic Non-interference
Sort
View
121
Voted
MOBISYS
2009
ACM
16 years 1 months ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...
90
Voted
RECOMB
2006
Springer
16 years 27 days ago
Detecting MicroRNA Targets by Linking Sequence, MicroRNA and Gene Expression Data
MicroRNAs (miRNAs) have recently been discovered as an important class of non-coding RNA genes that play a major role in regulating gene expression, providing a means to control th...
Jim C. Huang, Quaid Morris, Brendan J. Frey
FOCS
2008
IEEE
15 years 7 months ago
Kakeya Sets, New Mergers and Old Extractors
A merger is a probabilistic procedure which extracts the randomness out of any (arbitrarily correlated) set of random variables, as long as one of them is uniform. Our main result...
Zeev Dvir, Avi Wigderson
EMMCVPR
2007
Springer
15 years 6 months ago
Compositional Object Recognition, Segmentation, and Tracking in Video
Abstract. The complexity of visual representations is substantially limited by the compositional nature of our visual world which, therefore, renders learning structured object mod...
Björn Ommer, Joachim M. Buhmann
95
Voted
LICS
2006
IEEE
15 years 6 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon