Sciweavers

7984 search results - page 1595 / 1597
» Exploring personal information
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
INFOCOM
2011
IEEE
12 years 11 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu
IWMM
2011
Springer
206views Hardware» more  IWMM 2011»
12 years 10 months ago
A comprehensive evaluation of object scanning techniques
At the heart of all garbage collectors lies the process of identifying and processing reference fields within an object. Despite its key role, and evidence of many different impl...
Robin Garner, Stephen M. Blackburn, Daniel Frampto...
PLDI
2011
ACM
12 years 10 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
RECOMB
2011
Springer
12 years 10 months ago
Rich Parameterization Improves RNA Structure Prediction
Motivation. Current approaches to RNA structure prediction range from physics-based methods, which rely on thousands of experimentally-measured thermodynamic parameters, to machin...
Shay Zakov, Yoav Goldberg, Michael Elhadad, Michal...
« Prev « First page 1595 / 1597 Last » Next »