Sciweavers

771 search results - page 154 / 155
» Access Methods and Query Processing Techniques
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 28 days ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 7 months ago
Broadcast Cooperation Strategies for Two Colocated Users
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocati...
Avi Steiner, Amichai Sanderovich, Shlomo Shamai
BMCBI
2005
115views more  BMCBI 2005»
13 years 7 months ago
MPrime: efficient large scale multiple primer and oligonucleotide design for customized gene microarrays
Background: Enhancements in sequencing technology have recently yielded assemblies of large genomes including rat, mouse, human, fruit fly, and zebrafish. The availability of larg...
Eric C. Rouchka, Abdelnaby Khalyfa, Nigel G. F. Co...
SIGMOD
2012
ACM
232views Database» more  SIGMOD 2012»
11 years 9 months ago
Large-scale machine learning at twitter
The success of data-driven solutions to difficult problems, along with the dropping costs of storing and processing massive amounts of data, has led to growing interest in largesc...
Jimmy Lin, Alek Kolcz
BMCBI
2008
153views more  BMCBI 2008»
13 years 7 months ago
Improved general regression network for protein domain boundary prediction
Background: Protein domains present some of the most useful information that can be used to understand protein structure and functions. Recent research on protein domain boundary ...
Paul D. Yoo, Abdur R. Sikder, Bing Bing Zhou, Albe...