Sciweavers

1640 search results - page 135 / 328
» Deriving Private Information from Randomized Data
Sort
View
152
Voted
NAR
2011
234views Computer Vision» more  NAR 2011»
14 years 6 months ago
The UCSC cancer genomics browser: update 2011
The UCSC Cancer Genomics Browser (https:// genome-cancer.ucsc.edu) comprises a suite of web-based tools to integrate, visualize and analyze cancer genomics and clinical data. The ...
J. Zachary Sanborn, Stephen C. Benz, Brian Craft, ...
125
Voted
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
15 years 4 months ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
CERA
2004
89views more  CERA 2004»
15 years 3 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
176
Voted
BIBE
2008
IEEE
160views Bioinformatics» more  BIBE 2008»
15 years 10 months ago
Parallel integration of heterogeneous genome-wide data sources
— Heterogeneous genome-wide data sources capture information on various aspects of complex biological systems. For instance, transcriptome, interactome and phenome-level informat...
Derek Greene, Kenneth Bryan, Padraig Cunningham
147
Voted
MSWIM
2009
ACM
15 years 10 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe