Sciweavers

7080 search results - page 1340 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
BMCBI
2008
95views more  BMCBI 2008»
14 years 11 months ago
Mining protein networks for synthetic genetic interactions
Background: The local connectivity and global position of a protein in a protein interaction network are known to correlate with some of its functional properties, including its e...
Sri R. Paladugu, Shan Zhao, Animesh Ray, Alpan Rav...
WWW
2011
ACM
14 years 5 months ago
Two-stream indexing for spoken web search
This paper presents two-stream processing of audio to index the audio content for Spoken Web search. The first stream indexes the meta-data associated with a particular audio doc...
Jitendra Ajmera, Anupam Joshi, Sougata Mukherjea, ...
104
Voted
PLPV
2009
ACM
15 years 8 months ago
Positively dependent types
This paper is part of a line of work on using the logical techniques of polarity and focusing to design a dependent programming language, with particular emphasis on programming w...
Daniel R. Licata, Robert Harper
IDTRUST
2009
ACM
15 years 5 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
PODC
2003
ACM
15 years 4 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
« Prev « First page 1340 / 1416 Last » Next »