Sciweavers

1005 search results - page 201 / 201
» Privacy Preserving Clustering
Sort
View
SDM
2012
SIAM
247views Data Mining» more  SDM 2012»
11 years 7 months ago
Image Mining of Historical Manuscripts to Establish Provenance
he recent digitization of more than twenty million books has been led by initiatives from countries wishing to preserve their cultural heritage and by commercial endeavors, such a...
Bing Hu, Thanawin Rakthanmanon, Bilson J. L. Campa...
IUI
2010
ACM
13 years 11 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka
STORAGESS
2005
ACM
13 years 10 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
SAFECOMP
2005
Springer
13 years 10 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
CCGRID
2004
IEEE
13 years 8 months ago
Protection mechanisms for application service hosting platforms
The Application Service Hosting Platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared highperformance infrastructur...
Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann