Sciweavers

1989 search results - page 391 / 398
» cost 2010
Sort
View
PAISI
2010
Springer
13 years 7 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
PRIB
2010
Springer
176views Bioinformatics» more  PRIB 2010»
13 years 7 months ago
An On/Off Lattice Approach to Protein Structure Prediction from Contact Maps
Abstract. An important unsolved problem in structural bioinformatics is that of protein structure prediction (PSP), the reconstruction of a biologically plausible three-dimensional...
Stefano Teso, Cristina Di Risio, Andrea Passerini,...
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 7 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
SENSYS
2010
ACM
13 years 7 months ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
SENSYS
2010
ACM
13 years 7 months ago
Evolution and sustainability of a wildlife monitoring sensor network
As sensor network technologies become more mature, they are increasingly being applied to a wide variety of applications, ranging from agricultural sensing to cattle, oceanic and ...
Vladimir Dyo, Stephen A. Ellwood, David W. Macdona...