Sciweavers

22193 search results - page 4353 / 4439
» Multiple Restricted Multiplication
Sort
View
FOCS
2010
IEEE
14 years 9 months ago
Boosting and Differential Privacy
Boosting is a general method for improving the accuracy of learning algorithms. We use boosting to construct improved privacy-preserving synopses of an input database. These are da...
Cynthia Dwork, Guy N. Rothblum, Salil P. Vadhan
FPL
2010
Springer
188views Hardware» more  FPL 2010»
14 years 9 months ago
SeqHive: A Reconfigurable Computer Cluster for Genome Re-sequencing
We demonstrate how Field Programmable Gate Arrays (FPGAs) may be used to address the computing challenges associated with assembling genome sequences from recent ultra-high-through...
Kristian Stevens, Henry Chen, Terry Filiba, Peter ...
GLOBECOM
2010
IEEE
14 years 9 months ago
An Experimental Comparison of Burst Packet Transmission Schemes in IEEE 802.11-Based Wireless Mesh Networks
Abstract--Wireless mesh networks (WMNs) are wireless multihop networks comprised of mesh routers, which relay traffic on behalf of clients and other nodes. Using the standard IEEE ...
Peter Dely, Andreas Kassler, Nico Bayer, Dmitry Si...
GLOBECOM
2010
IEEE
14 years 9 months ago
ATMA: Advertisement-Based TDMA Protocol for Bursty Traffic in Wireless Sensor Networks
Energy conservation is one of the primary goals of the majority of MAC protocols designed for wireless sensor networks. In Sensor-MAC (S-MAC), one of the first MAC protocols design...
Surjya Sarathi Ray, Ilker Demirkol, Wendi Rabiner ...
GROUP
2010
ACM
14 years 9 months ago
Enhancing group recommendation by incorporating social relationship interactions
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social acti...
Mike Gartrell, Xinyu Xing, Qin Lv, Aaron Beach, Ri...
« Prev « First page 4353 / 4439 Last » Next »