Sciweavers

14 search results - page 2 / 3
» Prospex: Protocol Specification Extraction
Sort
View
FOCS
2010
IEEE
13 years 4 months ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
SIGSOFT
2007
ACM
14 years 7 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
BMCBI
2010
91views more  BMCBI 2010»
13 years 5 months ago
Washing scaling of GeneChip microarray expression
Background: Post-hybridization washing is an essential part of microarray experiments. Both the quality of the experimental washing protocol and adequate consideration of washing ...
Hans Binder, Knut Krohn, Conrad J. Burden
ACL
2008
13 years 7 months ago
Classification of Semantic Relationships between Nominals Using Pattern Clusters
There are many possible different semantic relationships between nominals. Classification of such relationships is an important and difficult task (for example, the well known nou...
Dmitry Davidov, Ari Rappoport
BMCBI
2008
95views more  BMCBI 2008»
13 years 6 months ago
Methodology capture: discriminating between the "best" and the rest of community practice
Background: The methodologies we use both enable and help define our research. However, as experimental complexity has increased the choice of appropriate methodologies has become...
James M. Eales, John W. Pinney, Robert D. Stevens,...