Sciweavers

1662 search results - page 8 / 333
» Privately Finding Specifications
Sort
View
ECCC
2006
120views more  ECCC 2006»
13 years 6 months ago
New Locally Decodable Codes and Private Information Retrieval Schemes
A q query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit xi of the message by querying only...
Sergey Yekhanin
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
13 years 4 months ago
Audio-visual privacy protection for video conference
Group video-conferencing systems are routinely used in major corporations, hospitals and universities for meetings, tele-medicine and distance learning among participants from very...
M. Vijay Venkatesh, Jian Zhao, L. Profitt, Sen-Chi...
ATAL
2007
Springer
13 years 10 months ago
MAGENTA technology case studies of magenta i-scheduler for road transportation
The paper describes functionality of Magenta Multi-Agent Logistics i-Scheduler Engine presented on AAMAS 2006 conferences and gives examples of its application in business domain....
Petr Skobelev, Andrey Glaschenko, Ilya Grachev, Se...
NAR
2011
204views Computer Vision» more  NAR 2011»
12 years 9 months ago
CLIPZ: a database and analysis environment for experimentally determined binding sites of RNA-binding proteins
The stability, localization and translation rate of mRNAs are regulated by a multitude of RNAbinding proteins (RBPs) that find their targets directly or with the help of guide RNA...
Mohsen Khorshid, Christoph Rodak, Mihaela Zavolan
JASIS
2008
77views more  JASIS 2008»
13 years 6 months ago
Citers' use of citees' names: Findings from a qualitative interview-based study
This article focuses on why academic writers in computer science and sociology sometimes supply the reader with more details of citees' names than they need to: why citers na...
Nigel Harwood