Sciweavers

447 search results - page 85 / 90
» 'Openness' and the public airwaves
Sort
View
ISBRA
2009
Springer
14 years 3 months ago
Imputation-Based Local Ancestry Inference in Admixed Populations
Abstract. Accurate inference of local ancestry from whole-genome genetic variation data is critical for understanding the history of admixed human populations and detecting SNPs as...
Bogdan Pasaniuc, Justin Kennedy, Ion I. Mandoiu
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
INFOCOM
2008
IEEE
14 years 3 months ago
Making Large Scale Deployment of RCP Practical for Real Networks
—We recently proposed the Rate Control Protocol (RCP) as a way to minimize download times (or flow-completion times). Simulations suggest that if RCP were widely deployed, downl...
Chia-Hui Tai, Jiang Zhu, Nandita Dukkipati
SECON
2008
IEEE
14 years 2 months ago
UDAE: Universal Data Access Engine for Sensor Networks
—We present the design and implementation of UDAE, a Universal Data Access Engine for wireless sensor networks. The UDAE allows developers to access data both locally and over th...
Krisakorn Rerkrai, Janne Riihijärvi, Petri M&...
TOOLS
2008
IEEE
14 years 2 months ago
Controlling Accessibility in Agile Projects with the Access Modifier Modifier
Access modifiers like public and private let the programmer control the accessibility of class members. Restricted accessibility supports encapsulation, i.e., the hiding of impleme...
Philipp Bouillon, Eric Großkinsky, Friedrich...