Sciweavers

5634 search results - page 1103 / 1127
» About Abstract Classes
Sort
View
AI
2005
Springer
15 years 1 months ago
Integrating Web Content Clustering into Web Log Association Rule Mining
Abstract. One of the effects of the general Internet growth is an immense number of user accesses to WWW resources. These accesses are recorded in the web server log files, which...
Jiayun Guo, Vlado Keselj, Qigang Gao
ECCV
2006
Springer
15 years 1 months ago
Spatial Intensity Correction of Fluorescent Confocal Laser Scanning Microscope Images
Abstract. This paper addresses the problem of intensity correction of fluorescent confocal laser scanning microscope (CLSM) images. CLSM images are frequently used in medical domai...
Sang-Chul Lee, Peter Bajcsy
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
15 years 1 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
CSCW
2008
ACM
15 years 1 months ago
Understanding the implications of social translucence for systems supporting communication at work
In this paper we describe a study that explored the implications of the Social Translucence framework for designing systems that support communications at work. Two systems design...
Agnieszka Matysiak Szóstek, Evangelos Karap...
ESOP
2008
Springer
15 years 1 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands
« Prev « First page 1103 / 1127 Last » Next »