Sciweavers

247 search results - page 47 / 50
» Extracting All the Randomness from a Weakly Random Source
Sort
View
KDD
2008
ACM
134views Data Mining» more  KDD 2008»
14 years 7 months ago
Privacy-preserving cox regression for survival analysis
Privacy-preserving data mining (PPDM) is an emergent research area that addresses the incorporation of privacy preserving concerns to data mining techniques. In this paper we prop...
Shipeng Yu, Glenn Fung, Rómer Rosales, Srir...
TMA
2010
Springer
166views Management» more  TMA 2010»
14 years 2 months ago
Understanding and Preparing for DNS Evolution
The Domain Name System (DNS) is a crucial component of today’s Internet. The top layer of the DNS hierarchy (the root nameservers) is facing dramatic changes: cryptographically s...
Sebastian Castro, Min Zhang, Wolfgang John, Duane ...
SPAA
2003
ACM
14 years 22 days ago
A practical algorithm for constructing oblivious routing schemes
In a (randomized) oblivious routing scheme the path chosen for a request between a source s and a target t is independent from the current traffic in the network. Hence, such a sc...
Marcin Bienkowski, Miroslaw Korzeniowski, Harald R...
BMCBI
2010
114views more  BMCBI 2010»
13 years 7 months ago
An integrative modular approach to systematically predict gene-phenotype associations
Background: Complex human diseases are often caused by multiple mutations, each of which contributes only a minor effect to the disease phenotype. To study the basis for these com...
Michael R. Mehan, Juan Nunez-Iglesias, Chao Dai, M...
BMCBI
2006
114views more  BMCBI 2006»
13 years 7 months ago
Evaluation and comparison of mammalian subcellular localization prediction methods
Background: Determination of the subcellular location of a protein is essential to understanding its biochemical function. This information can provide insight into the function o...
Josefine Sprenger, J. Lynn Fink, Rohan D. Teasdale