Sciweavers

3082 search results - page 23 / 617
» its 2004
Sort
View
PET
2004
Springer
14 years 25 days ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
14 years 25 days ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka
BIBE
2004
IEEE
107views Bioinformatics» more  BIBE 2004»
13 years 11 months ago
Enhanced pClustering and Its Applications to Gene Expression Data
Clustering has been one of the most popular methods to discover useful biological insights from DNA microarray. An interesting paradigm is simultaneous clustering of both genes an...
Sungroh Yoon, Christine Nardini, Luca Benini, Giov...
APBC
2004
164views Bioinformatics» more  APBC 2004»
13 years 9 months ago
Cluster Ensemble and Its Applications in Gene Expression Analysis
Huge amount of gene expression data have been generated as a result of the human genomic project. Clustering has been used extensively in mining these gene expression data to find...
Xiaohua Hu, Illhoi Yoo
AVI
2004
13 years 9 months ago
More than the sum of its members: challenges for group recommender systems
Systems that recommend items to a group of two or more users raise a number of challenging issues that are so far only partly understood. This paper identifies four of these issue...
Anthony Jameson