Sciweavers

139 search results - page 27 / 28
» Cryptographic Randomized Response Techniques
Sort
View
CIKM
2010
Springer
13 years 4 months ago
StableBuffer: optimizing write performance for DBMS applications on flash devices
Flash devices have been widely used in embedded systems, laptop computers, and enterprise servers. However, the poor random writes have been an obstacle to running write-intensive...
Yu Li, Jianliang Xu, Byron Choi, Haibo Hu
JMLR
2012
11 years 8 months ago
Age-Layered Expectation Maximization for Parameter Learning in Bayesian Networks
The expectation maximization (EM) algorithm is a popular algorithm for parameter estimation in models with hidden variables. However, the algorithm has several non-trivial limitat...
Avneesh Singh Saluja, Priya Krishnan Sundararajan,...
VLDB
1999
ACM
151views Database» more  VLDB 1999»
13 years 10 months ago
Cache Conscious Indexing for Decision-Support in Main Memory
As random access memory gets cheaper, it becomes increasingly affordable to build computers with large main memories. We consider decision support workloads within the context of...
Jun Rao, Kenneth A. Ross
CSDA
2008
128views more  CSDA 2008»
13 years 5 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
BMCBI
2005
127views more  BMCBI 2005»
13 years 5 months ago
Genomes are covered with ubiquitous 11 bp periodic patterns, the "class A flexible patterns"
Background: The genomes of prokaryotes and lower eukaryotes display a very strong 11 bp periodic bias in the distribution of their nucleotides. This bias is present throughout a g...
Etienne Larsabal, Antoine Danchin