Sciweavers

7430 search results - page 1279 / 1486
» Programming Applications in CIFF
Sort
View
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 11 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
VL
2008
IEEE
120views Visual Languages» more  VL 2008»
15 years 11 months ago
Unobtrusive data acquisition for spreadsheet research
Spreadsheets are one of the most common end-user programming environments in use today, and their importance in the business world continues to grow. Although considered critical ...
Brian Bishop, Kevin McDaid
ACSAC
2007
IEEE
15 years 11 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
CBMS
2007
IEEE
15 years 11 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
126
Voted
CGO
2007
IEEE
15 years 11 months ago
Exploiting Narrow Accelerators with Data-Centric Subgraph Mapping
The demand for high performance has driven acyclic computation accelerators into extensive use in modern embedded and desktop architectures. Accelerators that are ideal from a sof...
Amir Hormati, Nathan Clark, Scott A. Mahlke
« Prev « First page 1279 / 1486 Last » Next »