Sciweavers

1617 search results - page 289 / 324
» Recommender Systems
Sort
View
71
Voted
BMCBI
2010
50views more  BMCBI 2010»
14 years 12 months ago
Scanner calibration revisited
Background: Calibration of a microarray scanner is critical for accurate interpretation of microarray results. Shi et al. (BMC Bioinformatics, 2005, 6, Art. No. S11 Suppl. 2.) rep...
Alexander E. Pozhitkov
LATINCRYPT
2010
14 years 10 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
JCP
2007
105views more  JCP 2007»
14 years 11 months ago
Intuitive Network Applications: Learning for Personalized Converged Services Involving Social Networks
Abstract— The convergence of the wireline telecom, wireless telecom, and internet networks and the services they provide offers tremendous opportunities in services personalizati...
Robert Dinoff, Tin Kam Ho, Richard Hull, Bharat Ku...
TCOS
2010
14 years 6 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
CCS
2010
ACM
15 years 23 hour ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps