Sciweavers

554 search results - page 110 / 111
» Designing networks with good equilibria
Sort
View
CCS
2008
ACM
13 years 8 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
SIGCOMM
2010
ACM
13 years 6 months ago
Flexible multimedia content retrieval using InfoNames
Multimedia content is a dominant fraction of Internet usage today. At the same time, there is significant heterogeneity in video presentation modes and operating conditions of Int...
Arun Kumar, Ashok Anand, Aditya Akella, Athula Bal...
BMCBI
2010
106views more  BMCBI 2010»
13 years 6 months ago
Predicting MHC class I epitopes in large datasets
Background: Experimental screening of large sets of peptides with respect to their MHC binding capabilities is still very demanding due to the large number of possible peptide seq...
Kirsten Roomp, Iris Antes, Thomas Lengauer
BMCBI
2008
124views more  BMCBI 2008»
13 years 6 months ago
Ontology-based, Tissue MicroArray oriented, image centered tissue bank
Background: Tissue MicroArray technique is becoming increasingly important in pathology for the validation of experimental data from transcriptomic analysis. This approach produce...
Federica Viti, Ivan Merelli, Andrea Caprera, Barba...
BMCBI
2007
194views more  BMCBI 2007»
13 years 6 months ago
A meta-data based method for DNA microarray imputation
Background: DNA microarray experiments are conducted in logical sets, such as time course profiling after a treatment is applied to the samples, or comparisons of the samples unde...
Rebecka Jörnsten, Ming Ouyang, Hui-Yu Wang