Sciweavers

927 search results - page 164 / 186
» Practical Limits on Software Dependability: A Case Study
Sort
View
SENSYS
2003
ACM
14 years 24 days ago
Bluetooth and sensor networks: a reality check
The current generation of sensor nodes rely on commodity components. The choice of the radio is particularly important as it impacts not only energy consumption but also software ...
Martin Leopold, Mads Bondo Dydensborg, Philippe Bo...
ALT
2011
Springer
12 years 7 months ago
Semantic Communication for Simple Goals Is Equivalent to On-line Learning
Abstract. Previous works [11, 6] introduced a model of semantic communication between a “user” and a “server,” in which the user attempts to achieve a given goal for commun...
Brendan Juba, Santosh Vempala
BMCBI
2008
135views more  BMCBI 2008»
13 years 7 months ago
Facilitating the development of controlled vocabularies for metabolomics technologies with text mining
Background: Many bioinformatics applications rely on controlled vocabularies or ontologies to consistently interpret and seamlessly integrate information scattered across public r...
Irena Spasic, Daniel Schober, Susanna-Assunta Sans...
CASES
2009
ACM
14 years 2 months ago
A platform for developing adaptable multicore applications
Computer systems are resource constrained. Application adaptation is a useful way to optimize system resource usage while satisfying the application performance constraints. Previ...
Dan Fay, Li Shang, Dirk Grunwald
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger