Sciweavers

1640 search results - page 262 / 328
» Deriving Private Information from Randomized Data
Sort
View
JCO
2006
126views more  JCO 2006»
13 years 8 months ago
Combinatorics of TCP reordering
We study a combinatorial problem motivated by a receiver-oriented model of TCP traffic from [7], that incorporates information on both arrival times, and the dynamics of packet IDs...
Anders Hansson, Gabriel Istrate, Shiva Prasad Kasi...
INFOCOM
2007
IEEE
14 years 3 months ago
Shape Segmentation and Applications in Sensor Networks
—Many sensor network protocols in the literature implicitly assume that sensor nodes are deployed uniformly inside a simple geometric region. When the real deployment deviates fr...
Xianjin Zhu, Rik Sarkar, Jie Gao
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
14 years 1 months ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...
BMCBI
2011
13 years 3 months ago
Empirical Bayesian models for analysing molecular serotyping microarrays
Background: Microarrays offer great potential as a platform for molecular diagnostics, testing clinical samples for the presence of numerous biomarkers in highly multiplexed assay...
Richard Newton, Jason Hinds, Lorenz Wernisch
PODS
2005
ACM
151views Database» more  PODS 2005»
14 years 8 months ago
Estimating arbitrary subset sums with few probes
Suppose we have a large table T of items i, each with a weight wi, e.g., people and their salary. In a general preprocessing step for estimating arbitrary subset sums, we assign e...
Noga Alon, Nick G. Duffield, Carsten Lund, Mikkel ...