Sciweavers

3047 search results - page 286 / 610
» Randomized Parallel Selection
Sort
View
CCS
2009
ACM
15 years 9 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
126
Voted
ISBRA
2009
Springer
15 years 9 months ago
Mean Square Residue Biclustering with Missing Data and Row Inversions
Cheng and Church proposed a greedy deletion-addition algorithm to find a given number of k biclusters, whose mean squared residues (MSRs) are below certain thresholds and the miss...
Stefan Gremalschi, Gulsah Altun, Irina Astrovskaya...
106
Voted
SIGGRAPH
2009
ACM
15 years 9 months ago
RACBVHs: random-accessible compressed bounding volume hierarchies
We present a novel bounding volume hierarchy (BVH) compression and decompression method transparently supporting random access on the compressed BVHs. To support random access on ...
Tae-Joon Kim, Bochang Moon, Duksu Kim, Sung-Eui Yo...
BMCBI
2006
129views more  BMCBI 2006»
15 years 2 months ago
Identifying genes that contribute most to good classification in microarrays
Background: The goal of most microarray studies is either the identification of genes that are most differentially expressed or the creation of a good classification rule. The dis...
Stuart G. Baker, Barnett S. Kramer
108
Voted
SIGMETRICS
2008
ACM
117views Hardware» more  SIGMETRICS 2008»
15 years 2 months ago
Epidemic live streaming: optimal performance trade-offs
Several peer-to-peer systems for live streaming have been recently deployed (e.g. CoolStreaming, PPLive, SopCast). These all rely on distributed, epidemic-style dissemination mech...
Thomas Bonald, Laurent Massoulié, Fabien Ma...