Sciweavers

3077 search results - page 568 / 616
» Design Principles for Application Integration
Sort
View
BMCBI
2006
114views more  BMCBI 2006»
15 years 1 months ago
PROMPT: a protein mapping and comparison tool
Background: Comparison of large protein datasets has become a standard task in bioinformatics. Typically researchers wish to know whether one group of proteins is significantly en...
Thorsten Schmidt, Dmitrij Frishman
JSAC
2007
180views more  JSAC 2007»
15 years 1 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
CASES
2010
ACM
14 years 11 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
117
Voted
KDD
2009
ACM
133views Data Mining» more  KDD 2009»
16 years 2 months ago
On the tradeoff between privacy and utility in data publishing
In data publishing, anonymization techniques such as generalization and bucketization have been designed to provide privacy protection. In the meanwhile, they reduce the utility o...
Tiancheng Li, Ninghui Li
MOBISYS
2008
ACM
16 years 1 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...