Sciweavers

859 search results - page 165 / 172
» The Changing Face of Cryptography
Sort
View
MM
2010
ACM
148views Multimedia» more  MM 2010»
14 years 9 months ago
TwitterSigns: microblogging on the walls
In this paper we present TwitterSigns, an approach to display microblogs on public displays. Two different kinds of microblog entries (tweets) are selected for display: Tweets tha...
Markus Buzeck, Jörg Müller
ICDCS
2010
IEEE
14 years 9 months ago
Resource Allocation in Distributed Mixed-Criticality Cyber-Physical Systems
—Large-scale distributed cyber-physical systems will have many sensors/actuators (each with local micro-controllers), and a distributed communication/computing backbone with mult...
Karthik Lakshmanan, Dionisio de Niz, Ragunathan Ra...
BMCBI
2010
224views more  BMCBI 2010»
14 years 9 months ago
An adaptive optimal ensemble classifier via bagging and rank aggregation with applications to high dimensional data
Background: Generally speaking, different classifiers tend to work well for certain types of data and conversely, it is usually not known a priori which algorithm will be optimal ...
Susmita Datta, Vasyl Pihur, Somnath Datta
BMCBI
2007
121views more  BMCBI 2007»
14 years 9 months ago
A constrained polynomial regression procedure for estimating the local False Discovery Rate
Background: In the context of genomic association studies, for which a large number of statistical tests are performed simultaneously, the local False Discovery Rate (lFDR), which...
Cyril Dalmasso, Avner Bar-Hen, Philippe Broët
CACM
2008
84views more  CACM 2008»
14 years 9 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...