Sciweavers

963 search results - page 48 / 193
» Escape Analysis on Lists
Sort
View
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
16 years 1 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
ACMICEC
2003
ACM
90views ECommerce» more  ACMICEC 2003»
15 years 5 months ago
Automated analysis of P3P-enabled Web sites
The Platform for Privacy Preferences (P3P) provides a standard computer-readable format for privacy policies and a protocol that enables web browsers to read and process these pol...
Simon Byers, Lorrie Faith Cranor, David P. Kormann
128
Voted
AINA
2009
IEEE
15 years 4 months ago
Brain Image Registration Analysis Workflow for fMRI Studies on Global Grids
Scientific applications like neuroscience data analysis are usually compute and data-intensive. With the use of the additional capacity offered by distributed resources and suitab...
Suraj Pandey, William Voorsluys, Mustafizur Rahman...
CIKM
2008
Springer
15 years 2 months ago
Dynamic faceted search for discovery-driven analysis
We propose a dynamic faceted search system for discoverydriven analysis on data with both textual content and structured attributes. From a keyword query, we want to dynamically s...
Debabrata Dash, Jun Rao, Nimrod Megiddo, Anastasia...
101
Voted
WOB
2007
15 years 1 months ago
Gene Set Enrichment Analysis Using Non-parametric Scores
Abstract. Gene Set Enrichment Analysis (GSEA) is a well-known technique used for studying groups of functionally related genes and their correlation with phenotype. This method cre...
Ariel E. Bayá, Mónica G. Larese, Pab...