Sciweavers

17450 search results - page 3465 / 3490
» Numerical Methods with Applications
Sort
View
TITB
2008
204views more  TITB 2008»
15 years 2 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
BRAIN
2010
Springer
15 years 1 months ago
Sparse Regression Models of Pain Perception
Discovering brain mechanisms underlying pain perception remains a challenging neuroscientific problem with important practical applications, such as developing better treatments f...
Irina Rish, Guillermo A. Cecchi, Marwan N. Baliki,...
123
Voted
CIKM
2010
Springer
15 years 1 months ago
Top-Eye: top-k evolving trajectory outlier detection
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for identifying abnormal moving activities. Indeed, various asp...
Yong Ge, Hui Xiong, Zhi-hua Zhou, Hasan Ozdemir, J...
131
Voted
CORR
2010
Springer
193views Education» more  CORR 2010»
15 years 1 months ago
A Probabilistic Approach for Learning Folksonomies from Structured Data
Learning structured representations has emerged as an important problem in many domains, including document and Web data mining, bioinformatics, and image analysis. One approach t...
Anon Plangprasopchok, Kristina Lerman, Lise Getoor
128
Voted
ECCC
2010
98views more  ECCC 2010»
15 years 1 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
« Prev « First page 3465 / 3490 Last » Next »