Sciweavers

4498 search results - page 835 / 900
» The Power of Data
Sort
View
VLDB
1995
ACM
112views Database» more  VLDB 1995»
15 years 1 months ago
OPOSSUM: Desk-Top Schema Management through Customizable Visualization
Several recent trends have changed the usage and users of schemas beyond those of a database administrator’s tool for describing database contents. Distribution of computing pow...
Eben M. Haber, Yannis E. Ioannidis, Miron Livny
BMCBI
2007
86views more  BMCBI 2007»
14 years 10 months ago
Toxicogenomic analysis incorporating operon-transcriptional coupling and toxicant concentration-expression response: analysis of
Background: Deficiencies in microarray technology cause unwanted variation in the hybridization signal, obscuring the true measurements of intracellular transcript levels. Here we...
William O. Ward, Carol D. Swartz, Steffen Porwolli...
BMCBI
2008
110views more  BMCBI 2008»
14 years 10 months ago
Testing for treatment effects on gene ontology
In studies that use DNA arrays to assess changes in gene expression, it is preferable to measure the significance of treatment effects on a group of genes from a pathway or functi...
Taewon Lee, Varsha G. Desai, Cruz Velasco, Robert ...
PVLDB
2010
151views more  PVLDB 2010»
14 years 8 months ago
Advanced Processing for Ontological Queries
Ontology-based data access is a powerful form of extending database technology, where a classical extensional database (EDB) is enhanced by an ontology that generates new intensio...
Andrea Calì, Georg Gottlob, Andreas Pieris
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
15 years 10 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...