Sciweavers

3134 search results - page 286 / 627
» Computing full disjunctions
Sort
View
148
Voted
NDSS
2008
IEEE
15 years 9 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
TABLETOP
2008
IEEE
15 years 9 months ago
Adaptive interface for text input on large-scale interactive surfaces
In this paper we present a novel approach to text input on large interactive surfaces using a combination of strategies to resolve the inherent difficulties with text input on su...
Johannes Hirche, Peter Bomark, Mikael Bauer, Pawel...
117
Voted
WCNC
2008
IEEE
15 years 9 months ago
Analysis of Interference from Large Clusters as Modeled by the Sum of Many Correlated Lognormals
Abstract—We examine the statistical distribution of the interference produced by a cluster of very many co-channel interferers, e.g., a sensor network, or a city full of active w...
Sebastian S. Szyszkowicz, Halim Yanikomeroglu
138
Voted
CIBCB
2007
IEEE
15 years 9 months ago
A Comparison of Sequence Kernels for Localization Prediction of Transmembrane Proteins
Abstract— We applied Support Vector Machines to the prediction of the subcellular localization of transmembrane proteins, and compared the performance of different sequence kerne...
Stefan Maetschke, Marcus Gallagher, Mikael Bod&eac...
DSN
2007
IEEE
15 years 9 months ago
Using Register Lifetime Predictions to Protect Register Files against Soft Errors
— Device scaling and large integration increase the vulnerability of microprocessors to transient errors. One of the structures where errors can be most harmful is the register ...
Pablo Montesinos, Wei Liu, Josep Torrellas