Sciweavers

1064 search results - page 122 / 213
» Cryptography from Anonymity
Sort
View
MST
2007
122views more  MST 2007»
13 years 10 months ago
Rendezvous and Election of Mobile Agents: Impact of Sense of Direction
Consider a collection of r identical asynchronous mobile agents dispersed on an arbitrary anonymous network of size n. The agents all execute the same protocol and move from node ...
Lali Barrière, Paola Flocchini, Pierre Frai...
SCFBM
2008
119views more  SCFBM 2008»
13 years 10 months ago
OSPACS: Ultrasound image management system
Background: Ultrasound scanning uses the medical imaging format, DICOM, for electronically storing the images and data associated with a particular scan. Large health care facilit...
Will Stott, Andy Ryan, Ian J. Jacobs, Usha Menon, ...
NAR
2011
233views Computer Vision» more  NAR 2011»
13 years 1 months ago
TIARA: a database for accurate analysis of multiple personal genomes based on cross-technology
High-throughput genomic technologies have been used to explore personal human genomes for the past few years. Although the integration of technologies is important for high-accura...
Dongwan Hong, Sung-Soo Park, Young Seok Ju, Sheehy...
IRI
2007
IEEE
14 years 4 months ago
Natural Language Processing and e-Government: Extracting Reusable Crime Report Information
Crime reporting needs to be possible 24/7. Although 911 and tip-lines are the most publicized reporting mechanisms, several other options exist, ranging from inperson reporting to...
Alicia Iriberri, Gondy Leroy
PVLDB
2010
143views more  PVLDB 2010»
13 years 8 months ago
Embellishing Text Search Queries To Protect User Privacy
Users of text search engines are increasingly wary that their activities may disclose confidential information about their business or personal profiles. It would be desirable f...
HweeHwa Pang, Xuhua Ding, Xiaokui Xiao