Sciweavers

796 search results - page 136 / 160
» Spoofing prevention method
Sort
View
CCS
2009
ACM
16 years 5 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
RECOMB
2006
Springer
16 years 4 months ago
Genome-Wide Discovery of Modulators of Transcriptional Interactions in Human B Lymphocytes
Abstract. Transcriptional interactions in a cell are modulated by a variety of mechanisms that prevent their representation as pure pairwise interactions between a transcription fa...
Kai Wang, Ilya Nemenman, Nilanjana Banerjee, Adam ...
ICRA
2009
IEEE
171views Robotics» more  ICRA 2009»
15 years 11 months ago
Consistent cooperative localization
— In cooperative navigation, teams of mobile robots obtain range and/or angle measurements to each other and dead-reckoning information to help each other navigate more accuratel...
Alexander Bahr, Matthew R. Walter, John J. Leonard
FC
2009
Springer
134views Cryptology» more  FC 2009»
15 years 11 months ago
Cryptographic Combinatorial Securities Exchanges
Abstract. We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information ...
Christopher Thorpe, David C. Parkes
149
Voted
GECCO
2009
Springer
112views Optimization» more  GECCO 2009»
15 years 11 months ago
Soft memory for stock market analysis using linear and developmental genetic programming
Recently, a form of memory usage was introduced for genetic programming (GP) called “soft memory.” Rather than have a new value completely overwrite the old value in a registe...
Garnett Carl Wilson, Wolfgang Banzhaf