Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Abstract. A data-adaptive approach for cDNA microarray image enhancement is presented. Through the weighting coefficients adaptively determined from local microarray image statisti...
Rastislav Lukac, Konstantinos N. Plataniotis, Bogd...
As the processor-memory performance gap continues to grow, so does the need for effective tools and metrics to guide the design of efficient memory hierarchies to bridge that gap....
Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, enabling imp...
Mobile phones are being increasingly equipped with sensors that ease retrieval of context information about a user. Context data can be aggregated with information centrally avail...
Laurent-Walter Goix, Massimo Valla, Laura Cerami, ...