Sciweavers

10819 search results - page 1939 / 2164
» Addition and multiplication of sets
Sort
View
80
Voted
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
15 years 10 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han
ICCAD
2002
IEEE
92views Hardware» more  ICCAD 2002»
15 years 9 months ago
ECO algorithms for removing overlaps between power rails and signal wires
Design ECO commonly happens in industry due to constraints or target changes from manufacturing, marketing, reliability, or performance. At each step, designers usually want to mo...
Hua Xiang, Kai-Yuan Chao, D. F. Wong
100
Voted
IUI
2009
ACM
15 years 9 months ago
Intelligently creating and recommending reusable reformatting rules
When users combine data from multiple sources into a spreadsheet or dataset, the result is often a mishmash of different formats, since phone numbers, dates, course numbers and ot...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
104
Voted
CVPR
2010
IEEE
15 years 9 months ago
Toward Coherent Object Detection And Scene Layout Understanding
Detecting objects in complex scenes while recovering the scene layout is a critical functionality in many vision-based applications. Inspired by the work of [18], we advocate the ...
Yingze Bao, Min Sun, Silvio Savarese
104
Voted
WWW
2010
ACM
15 years 7 months ago
Measurement-calibrated graph models for social network experiments
Access to realistic, complex graph datasets is critical to research on social networking systems and applications. Simulations on graph data provide critical evaluation of new sys...
Alessandra Sala, Lili Cao, Christo Wilson, Robert ...
« Prev « First page 1939 / 2164 Last » Next »