Sciweavers

4698 search results - page 907 / 940
» Making Functionality More General
Sort
View
131
Voted
BIBM
2009
IEEE
155views Bioinformatics» more  BIBM 2009»
15 years 9 months ago
Towards Reliable Isoform Quantification Using RNA-Seq Data
Background: In eukaryotes, alternative splicing often generates multiple splice variants from a single gene. Here weexplore the use of RNA sequencing (RNA-Seq) datasets to address...
Brian E. Howard, Steffen Heber
157
Voted
FOCS
2009
IEEE
15 years 9 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
118
Voted
ICC
2009
IEEE
148views Communications» more  ICC 2009»
15 years 9 months ago
A Game-Theoretic Analysis of Inter-Session Network Coding
Abstract— A common assumption in the network coding literature is that the users are cooperative and will not pursue their own interests. However, this assumption can be violated...
Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W...
123
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
WINE
2009
Springer
138views Economy» more  WINE 2009»
15 years 9 months ago
On the Impact of Strategy and Utility Structures on Congestion-Averse Games
Recent results regarding games with congestion-averse utilities (or, congestion-averse games—CAGs) have shown they possess some very desirable properties. Specifically, they hav...
Thomas Voice, Maria Polukarov, Andrew Byde, Nichol...