Sciweavers

759 search results - page 97 / 152
» What Can Be Implemented Anonymously
Sort
View
WWW
2003
ACM
14 years 10 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
RECOMB
2006
Springer
14 years 10 months ago
Leveraging Information Across HLA Alleles/Supertypes Improves Epitope Prediction
We present a model for predicting HLA class I restricted CTL epitopes. In contrast to almost all other work in this area, we train a single model on epitopes from all HLA alleles a...
David Heckerman, Carl Myers Kadie, Jennifer Listga...
OSDI
2008
ACM
14 years 10 months ago
SQCK: A Declarative File System Checker
The lowly state of the art for file system checking and repair does not match what is needed to keep important data available for users. Current file system checkers, such as e2fs...
Haryadi S. Gunawi, Abhishek Rajimwale, Andrea C. A...
SIGMOD
2004
ACM
157views Database» more  SIGMOD 2004»
14 years 10 months ago
Holistic UDAFs at streaming speeds
Many algorithms have been proposed to approximate holistic aggregates, such as quantiles and heavy hitters, over data streams. However, little work has been done to explore what t...
Graham Cormode, Theodore Johnson, Flip Korn, S. Mu...
ICSE
2004
IEEE-ACM
14 years 10 months ago
Efficient Decentralized Monitoring of Safety in Distributed Systems
We describe an efficient decentralized monitoring algorithm that monitors a distributed program's execution to check for violations of safety properties. The monitoring is ba...
Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu