Sciweavers

1402 search results - page 238 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
CCS
2008
ACM
15 years 1 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
SENSYS
2006
ACM
15 years 5 months ago
Capturing high-frequency phenomena using a bandwidth-limited sensor network
Small-form-factor, low-power wireless sensors—motes—are convenient to deploy, but lack the bandwidth to capture and transmit raw high-frequency data, such as human voices or n...
Ben Greenstein, Christopher Mar, Alex Pesterev, Sh...
BMCBI
2010
141views more  BMCBI 2010»
14 years 12 months ago
CIG-DB: the database for human or mouse immunoglobulin and T cell receptor genes available for cancer studies
Background: Immunoglobulin (IG or antibody) and the T-cell receptor (TR) are pivotal proteins in the immune system of higher organisms. In cancer immunotherapy, the immune respons...
Yoji Nakamura, Tomoyoshi Komiyama, Motoki Furue, T...
ICSE
2008
IEEE-ACM
15 years 12 months ago
CCVisu: automatic visual software decomposition
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given s...
Dirk Beyer
EUROSEC
2010
ACM
15 years 5 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...