Sciweavers

2673 search results - page 497 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 8 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
POPL
2012
ACM
12 years 3 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
EUROPAR
2009
Springer
14 years 13 days ago
MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualiz...
Anastassios Nanos, Nectarios Koziris
NIPS
2004
13 years 9 months ago
Bayesian inference in spiking neurons
We propose a new interpretation of spiking neurons as Bayesian integrators accumulating evidence over time about events in the external world or the body, and communicating to oth...
Sophie Deneve
IJCAI
2003
13 years 9 months ago
Towards Pervasive Robotics
Pervasive robotics will require, in a near future, small, light and cheap robots that exhibit complex behaviors. These demands led to the development of the M2-M4 Macaco project -...
Artur M. Arsenio