• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 19,547
Next 10 →

Calibrating noise to sensitivity in private data analysis

by Cynthia Dwork, Frank Mcsherry, Kobbi Nissim, Adam Smith - In Proceedings of the 3rd Theory of Cryptography Conference , 2006
"... Abstract. We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f to the datab ..."
Abstract - Cited by 649 (60 self) - Add to MetaCart
Abstract. We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
in the circuit and force them to decrypt it. Rather than using a single multiply encrypted data structure (an onion) to lay each circuit, Tor now uses an incremental or telescoping path-building design, where the initiator negotiates session keys with each successive hop in the circuit. Once these keys

Myrinet: A Gigabit-per-Second Local Area Network

by Nanette J. Boden, Danny Cohen, Robert E. Felderman, Alan E. Kulawik, Charles L. Seitz, Jakov N. Seizovic, Wen-king Su - IEEE Micro , 1995
"... Abstract. Myrinet is a new type of local-area network (LAN) based on the technology used for packet communication and switching within "massivelyparallel processors " (MPPs). Think of Myrinet as an MPP message-passing network that can span campus dimensions, rather than as a wide-a ..."
Abstract - Cited by 1011 (0 self) - Add to MetaCart
-area telecommunications network that is operating in close quarters. The technical steps toward making Myrinet a reality included the development of (1) robust, 25m communication channels with flow control, packet framing, and error control; (2) self-initializing, low-latency, cut-through switches; (3) host interfaces

Negotiation decision functions for autonomous agents

by Peyman Faratin, Carles Sierra, Nick R. Jennings - International Journal of Robotics and Autonomous Systems , 1998
"... We present a formal model of negotiation between autonomous agents. The purpose of the negotiation is to reach an agreement about the provision of a service by one agent for another. The model de nes a range of strategies and tactics that agents can employ to generate initial o ers, evaluate proposa ..."
Abstract - Cited by 359 (58 self) - Add to MetaCart
We present a formal model of negotiation between autonomous agents. The purpose of the negotiation is to reach an agreement about the provision of a service by one agent for another. The model de nes a range of strategies and tactics that agents can employ to generate initial o ers, evaluate

Asymmetry in the assembly of the RNAi enzyme complex. Cell 115

by Dianne S. Schwarz, György Hutvágner, Tingting Du, Zuoshang Xu, Neil Aronin, Phillip D. Zamore , 2003
"... A key step in RNA interference (RNAi) is assembly of the RISC, the protein-siRNA complex that mediates target RNA cleavage. Here, we show that the two strands of an siRNA duplex are not equally eligible for assembly into RISC. Rather, both the absolute and relative stabilities of the base pairs at t ..."
Abstract - Cited by 405 (6 self) - Add to MetaCart
A key step in RNA interference (RNAi) is assembly of the RISC, the protein-siRNA complex that mediates target RNA cleavage. Here, we show that the two strands of an siRNA duplex are not equally eligible for assembly into RISC. Rather, both the absolute and relative stabilities of the base pairs

Statistical shape influence in geodesic active contours

by Michael E. Leventon, W. Eric, L. Grimson, Olivier Faugeras - In Proc. 2000 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), Hilton Head, SC , 2000
"... A novel method of incorporating shape information into the image segmentation process is presented. We introduce a representation for deformable shapes and define a probability distribution over the variances of a set of training shapes. The segmentation process embeds an initial curve as the zero l ..."
Abstract - Cited by 396 (4 self) - Add to MetaCart
A novel method of incorporating shape information into the image segmentation process is presented. We introduce a representation for deformable shapes and define a probability distribution over the variances of a set of training shapes. The segmentation process embeds an initial curve as the zero

Hypertext Transfer Protocol - HTTP/1.0

by T. Berners-Lee, R. T. Fielding, H. Frystyk Nielsen , 1994
"... The Hypertext Transfer Protocol (HTTP) is an application-level protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed o ..."
Abstract - Cited by 310 (13 self) - Add to MetaCart
object management systems, through extension of its request methods (commands). A feature of HTTP is the typing and negotiation of data representation, allowing systems to be built independently of the data being transferred. HTTP has been in use by the World-Wide Web global information initiative since

The lin-4 regulatory RNA controls developmental timing in Caenorhabditis elegans by blocking LIN-14 protein synthesis after the initiation of translation

by Philip H. Olsen, Victor Ambros - Dev. Biol , 1999
"... lin-4 encodes a small RNA that is complementary to sequences in the 3 � untranslated region (UTR) of lin-14 mRNA and that acts to developmentally repress the accumulation of LIN-14 protein. This repression is essential for the proper timing of numerous events of Caenorhabditis elegans larval develop ..."
Abstract - Cited by 255 (7 self) - Add to MetaCart
polysomal sedimentation profile do not change in response to the accumulation of lin-4 RNA. Our results indicate that association of lin-4 RNA with the 3 � UTR of lin-14 mRNA permits normal biogenesis of lin-14 mRNA, and normal translational initiation, but inhibits step(s) thereafter, such as translational

Quantization of Four-form Fluxes and Dynamical Neutralization Of The Cosmological Constant

by Raphael Bousso, Joseph Polchinski , 2000
"... A four-form gauge flux makes a variable contribution to the cosmological constant. This has often been assumed to take continuous values, but we argue that it has a generalized Dirac quantization condition. For a single flux the steps are much larger than the observational limit, but we show that wi ..."
Abstract - Cited by 274 (21 self) - Add to MetaCart
A four-form gauge flux makes a variable contribution to the cosmological constant. This has often been assumed to take continuous values, but we argue that it has a generalized Dirac quantization condition. For a single flux the steps are much larger than the observational limit, but we show

Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms

by Chenyang Lu, John A. Stankovic, Sang H. Son, Gang Tao - Journal of Real-Time Systems, Special Issue on Control-Theoretical Approaches to Real-Time Computing , 2002
"... This paper presents a feedback control real-time scheduling (FCS) framework for adaptive real-time systems. An advantage of the FCS framework is its use of feedback control theory (rather than ad hoc solutions) as a scientific underpinning. We apply a control theory based methodology to systematical ..."
Abstract - Cited by 274 (47 self) - Add to MetaCart
to systematically design FCS algorithms to satisfy the transient and steady state performance specifications of real-time systems. In particular, we establish dynamic models of real-time systems and develop performance analyses of FCS algorithms, which are major challenges and key steps for the design of control
Next 10 →
Results 11 - 20 of 19,547
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University