Sciweavers

808 search results - page 84 / 162
» Distributed Anonymization: Achieving Privacy for Both Data S...
Sort
View
ISBI
2008
IEEE
14 years 8 months ago
An information-based clustering approach for fMRI activation detection
Most clustering algorithms in fMRI analysis implicitly require some nontrivial assumption on data structure. Due to arbitrary distribution of fMRI time series in the temporal doma...
Lijun Bai, Wei Qin, Jimin Liang, Jie Tian
EUROSYS
2009
ACM
14 years 4 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ con...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
ASPLOS
2011
ACM
12 years 11 months ago
Blink: managing server clusters on intermittent power
Reducing the energy footprint of data centers continues to receive significant attention due to both its financial and environmental impact. There are numerous methods that limi...
Navin Sharma, Sean Barker, David Irwin, Prashant J...
GECCO
2007
Springer
258views Optimization» more  GECCO 2007»
13 years 11 months ago
TFBS identification by position- and consensus-led genetic algorithm with local filtering
Identification of Transcription Factor Binding Site (TFBS) motifs in multiple DNA upstream sequences is important in understanding the mechanism of gene regulation. This identific...
Tak-Ming Chan, Kwong-Sak Leung, Kin-Hong Lee
SIGCOMM
2012
ACM
11 years 10 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...