Sciweavers

59 search results - page 5 / 12
» On granting limited access to private information
Sort
View
ICPP
2008
IEEE
15 years 3 months ago
Taming Single-Thread Program Performance on Many Distributed On-Chip L2 Caches
This paper presents a two-part study on managing distributed NUCA (Non-Uniform Cache Architecture) L2 caches in a future manycore processor to obtain high singlethread program per...
Lei Jin, Sangyeun Cho
CIAC
2003
Springer
98views Algorithms» more  CIAC 2003»
15 years 2 months ago
Improving Customer Proximity to Railway Stations
Abstract. We consider problems of (new) station placement along (existing) railway tracks, so as to increase the number of users. We prove that, in spite of the NP-hardness for the...
Evangelos Kranakis, Paolo Penna, Konrad Schlude, D...
CHI
2002
ACM
15 years 9 months ago
SCANMail: a voicemail interface that makes speech browsable, readable and searchable
Increasing amounts of public, corporate, and private speech data are now available on-line. These are limited in their usefulness, however, by the lack of tools to permit their br...
Steve Whittaker, Julia Hirschberg, Brian Amento, L...
NAR
2011
204views Computer Vision» more  NAR 2011»
14 years 8 days ago
CLIPZ: a database and analysis environment for experimentally determined binding sites of RNA-binding proteins
The stability, localization and translation rate of mRNAs are regulated by a multitude of RNAbinding proteins (RBPs) that find their targets directly or with the help of guide RNA...
Mohsen Khorshid, Christoph Rodak, Mihaela Zavolan
SAC
2006
ACM
14 years 9 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...