Sciweavers

2424 search results - page 236 / 485
» A general algorithm for data dependence analysis
Sort
View
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
16 years 4 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
16 years 4 months ago
Formulating distance functions via the kernel trick
Tasks of data mining and information retrieval depend on a good distance function for measuring similarity between data instances. The most effective distance function must be for...
Gang Wu, Edward Y. Chang, Navneet Panda
IHI
2010
186views Healthcare» more  IHI 2010»
14 years 11 months ago
Analysis of an online health social network
With the continued advances of Web 2.0, health-centered Online Social Networks (OSNs) are emerging to provide knowledge and support for those interested in managing their own heal...
Xiaoxiao Ma, Guanling Chen, Juntao Xiao
ISCC
2009
IEEE
106views Communications» more  ISCC 2009»
15 years 10 months ago
Multivariate reduction in wireless sensor networks
In wireless sensor networks, energy consumption is generally associated with the amount of sent data once communication is the activity of the network that consumes more energy. T...
Orlando Silva Junior, André L. L. de Aquino...
SIGMOD
2011
ACM
198views Database» more  SIGMOD 2011»
14 years 7 months ago
U-MAP: a system for usage-based schema matching and mapping
This demo shows how usage information buried in query logs can play a central role in data integration and data exchange. More specifically, our system U-Map uses query logs to g...
Hazem Elmeleegy, Jaewoo Lee, El Kindi Rezig, Moura...