Sciweavers

261 search results - page 16 / 53
» Application domain independent policy conflict analysis usin...
Sort
View
BTW
2007
Springer
123views Database» more  BTW 2007»
15 years 3 months ago
Data Provenance: A Categorization of Existing Approaches
: In many application areas like e-science and data-warehousing detailed information about the origin of data is required. This kind of information is often referred to as data pro...
Boris Glavic, Klaus R. Dittrich
EDBTW
2010
Springer
15 years 4 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
SIGMETRICS
2010
ACM
195views Hardware» more  SIGMETRICS 2010»
15 years 1 months ago
CWS: a model-driven scheduling policy for correlated workloads
We define CWS, a non-preemptive scheduling policy for workloads with correlated job sizes. CWS tackles the scheduling problem by inferring the expected sizes of upcoming jobs bas...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
DKE
2007
130views more  DKE 2007»
14 years 9 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
PAMI
2007
353views more  PAMI 2007»
14 years 9 months ago
Dynamic Texture Recognition Using Local Binary Patterns with an Application to Facial Expressions
— Dynamic texture is an extension of texture to the temporal domain. Description and recognition of dynamic textures have attracted growing attention. In this paper, a novel appr...
Guoying Zhao, Matti Pietikäinen