Sciweavers

2030 search results - page 398 / 406
» The Need for Customizable Operating Systems
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
BMCBI
2008
147views more  BMCBI 2008»
13 years 7 months ago
Simple integrative preprocessing preserves what is shared in data sources
Background: Bioinformatics data analysis toolbox needs general-purpose, fast and easily interpretable preprocessing tools that perform data integration during exploratory data ana...
Abhishek Tripathi, Arto Klami, Samuel Kaski
BMCBI
2006
122views more  BMCBI 2006»
13 years 7 months ago
BioMoby extensions to the Taverna workflow management and enactment software
Background: As biology becomes an increasingly computational science, it is critical that we develop software tools that support not only bioinformaticians, but also bench biologi...
Edward A. Kawas, Martin Senger, Mark D. Wilkinson
IEICET
2008
106views more  IEICET 2008»
13 years 7 months ago
Realization of Low Power High-Speed Channel Filters with Stringent Adjacent Channel Attenuation Specifications for Wireless Comm
Finite impulse response (FIR) filtering is the most computationally intensive operation in the channelizer of a wireless communication receiver. Higher order FIR channel filters a...
Jimson Mathew, R. Mahesh, A. Prasad Vinod, Edmund ...
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng