Sciweavers

1005 search results - page 154 / 201
» Practical Secure Function Evaluation
Sort
View
84
Voted
JBI
2008
15 years 15 days ago
Categorizing the world of registries
The term registry is widely used to refer to any database storing clinical information collected as a byproduct of patient care. Despite the use of this single characterizing term...
Brian C. Drolet, Kevin B. Johnson
177
Voted
CVPR
2009
IEEE
16 years 6 months ago
A Graph-based Approach to Skin Mole Matching Incorporating Template-Normalized Coordinates
Density of moles is a strong predictor of malignant melanoma. Some dermatologists advocate periodic fullbody scan for high-risk patients. In current practice, physicians compare...
Ghassan Hamarneh, Hengameh Mirzaalian, Tim K. Lee
83
Voted
RECOMB
2003
Springer
16 years 25 days ago
Designing seeds for similarity search in genomic DNA
Large-scale comparison of genomic DNA is of fundamental importance in annotating functional elements of genomes. To perform large comparisons efficiently, BLAST (Methods: Companio...
Jeremy Buhler, Uri Keich, Yanni Sun
93
Voted
CAV
2007
Springer
121views Hardware» more  CAV 2007»
15 years 6 months ago
Algorithms for Interface Synthesis
Abstract. A temporal interface for a software component is a finite automaton that specifies the legal sequences of calls to functions that are provided by the component. We comp...
Dirk Beyer, Thomas A. Henzinger, Vasu Singh
97
Voted
INFOCOM
2002
IEEE
15 years 5 months ago
Travelling Miser Problem
— Various monitoring and performance evaluation tools generate considerable amount of low priority traffic. This information is not always needed in real time, and thus could of...
Yuval Shavitt, David Breitgand, Danny Raz