Sciweavers

1662 search results - page 256 / 333
» Privately Finding Specifications
Sort
View
SOCIALCOM
2010
13 years 8 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...
CIKM
2010
Springer
13 years 6 months ago
Mining networks with shared items
Recent advances in data processing have enabled the generation of large and complex graphs. Many researchers have developed techniques to investigate informative structures within...
Jun Sese, Mio Seki, Mutsumi Fukuzaki
BMCBI
2011
13 years 5 months ago
Statistical learning techniques applied to epidemiology: a simulated case-control comparison study with logistic regression
Background: When investigating covariate interactions and group associations with standard regression analyses, the relationship between the response variable and exposure may be ...
John J. Heine, Walker H. Land Jr., Kathleen M. Ega...
BMCBI
2011
13 years 5 months ago
Errors in CGAP xProfiler and cDNA DGED: the importance of library parsing and gene selection algorithms
Background: The Cancer Genome Anatomy Project (CGAP) xProfiler and cDNA Digital Gene Expression Displayer (DGED) have been made available to the scientific community over a decade...
Andrew T. Milnthorpe, Mikhail Soloviev
TIT
2010
146views Education» more  TIT 2010»
13 years 5 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener