Sciweavers

859 search results - page 165 / 172
» The Changing Face of Cryptography
Sort
View
MM
2010
ACM
148views Multimedia» more  MM 2010»
14 years 12 months ago
TwitterSigns: microblogging on the walls
In this paper we present TwitterSigns, an approach to display microblogs on public displays. Two different kinds of microblog entries (tweets) are selected for display: Tweets tha...
Markus Buzeck, Jörg Müller
ICDCS
2010
IEEE
14 years 12 months ago
Resource Allocation in Distributed Mixed-Criticality Cyber-Physical Systems
—Large-scale distributed cyber-physical systems will have many sensors/actuators (each with local micro-controllers), and a distributed communication/computing backbone with mult...
Karthik Lakshmanan, Dionisio de Niz, Ragunathan Ra...
BMCBI
2010
224views more  BMCBI 2010»
14 years 12 months ago
An adaptive optimal ensemble classifier via bagging and rank aggregation with applications to high dimensional data
Background: Generally speaking, different classifiers tend to work well for certain types of data and conversely, it is usually not known a priori which algorithm will be optimal ...
Susmita Datta, Vasyl Pihur, Somnath Datta
BMCBI
2007
121views more  BMCBI 2007»
14 years 12 months ago
A constrained polynomial regression procedure for estimating the local False Discovery Rate
Background: In the context of genomic association studies, for which a large number of statistical tests are performed simultaneously, the local False Discovery Rate (lFDR), which...
Cyril Dalmasso, Avner Bar-Hen, Philippe Broët
CACM
2008
84views more  CACM 2008»
14 years 12 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...