Sciweavers

3233 search results - page 202 / 647
» Probabilistic Data Exchange
Sort
View
CSB
2004
IEEE
14 years 1 months ago
MISAE: A New Approach for Regulatory Motif Extraction
The recognition of regulatory motifs of co-regulated genes is essential for understanding the regulatory mechanisms. However, the automatic extraction of regulatory motifs from a ...
Zhaohui Sun, Jingyi Yang, Jitender S. Deogun
CSREASAM
2006
13 years 11 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
SIGMOD
2003
ACM
104views Database» more  SIGMOD 2003»
14 years 9 months ago
XML schema
The United States Environmental Protection Agency (EPA) prepares a national criteria and hazardous air pollutant (HAP) emission inventory with input from numerous states, local an...
Charles E. Campbell, Andrew Eisenberg, Jim Melton
CHI
2003
ACM
14 years 10 months ago
AuraMirror: artistically visualizing attention
We present AuraMirror, a system that visualizes virtual windows of attention: the commodity of visual attention people exchange during interactions in small groups. AuraMirror act...
Alexander W. Skaburskis, Jeffrey S. Shell, Roel Ve...
PERCOM
2005
ACM
14 years 9 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...