Sciweavers

2355 search results - page 132 / 471
» Anonymizing Temporal Data
Sort
View
JCP
2006
100views more  JCP 2006»
13 years 10 months ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah

Book
3022views
15 years 6 months ago
Algorithms for Programmers
"This is the (work in progress) book "Algorithms for Programmers". Publication as soon as possible, content is (modulo copy editing) close to final version. I will p...
Jörg Arndt
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 3 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
NAR
1998
104views more  NAR 1998»
13 years 9 months ago
Database on the structure of large ribosomal subunit RNA
Our database on large ribosomal subunit RNA contained 334 sequences in July, 1995. All sequences in the database are aligned, taking into account secondary structure. The aligned ...
Peter De Rijk, An Caers, Yves Van de Peer, Rupert ...
WSDM
2009
ACM
113views Data Mining» more  WSDM 2009»
14 years 5 months ago
Time Will Tell: Leveraging Temporal Expressions in IR
Temporal expressions, such as between 1992 and 2000, are frequent across many kinds of documents. Text retrieval, though, treats them as common terms, thus ignoring their inherent...
Irem Arikan, Srikanta J. Bedathur, Klaus Berberich