Sciweavers

455 search results - page 51 / 91
» Differential Privacy in New Settings
Sort
View
DAC
2001
ACM
15 years 10 months ago
Transformations for the Synthesis and Optimization of Asynchronous Distributed Control
Asynchronous design has been the focus of renewed interest. However, a key bottleneck is the lack of high-quality CAD tools for the synthesis of large-scale systems which also all...
Michael Theobald, Steven M. Nowick
79
Voted
CEC
2010
IEEE
14 years 7 months ago
A grammar based Ant Programming algorithm for mining classification rules
This paper focuses on the application of a new ACO-based automatic programming algorithm to the classification task of data mining. This new model, called GBAP algorithm, is based ...
Juan Luis Olmo, José Raúl Romero, Se...
BMCBI
2008
122views more  BMCBI 2008»
14 years 9 months ago
Determining gene expression on a single pair of microarrays
Background: In microarray experiments the numbers of replicates are often limited due to factors such as cost, availability of sample or poor hybridization. There are currently fe...
Robert W. Reid, Anthony A. Fodor
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
14 years 11 months ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker
PERCOM
2007
ACM
15 years 9 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...