Sciweavers

2061 search results - page 93 / 413
» Authorization for Metacomputing Applications
Sort
View
120
Voted
KDD
2009
ACM
228views Data Mining» more  KDD 2009»
16 years 1 months ago
A generalized Co-HITS algorithm and its application to bipartite graphs
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
Hongbo Deng, Michael R. Lyu, Irwin King
CHI
2008
ACM
16 years 1 months ago
Activity-based prototyping of ubicomp applications for long-lived, everyday human activities
We designed an activity-based prototyping process realized in the ActivityDesigner system that combines the theoretical framework of Activity-Centered Design with traditional iter...
Yang Li, James A. Landay
113
Voted
FPGA
2009
ACM
273views FPGA» more  FPGA 2009»
15 years 7 months ago
A parallel/vectorized double-precision exponential core to accelerate computational science applications
Many natural processes exhibit exponential decay and, consequently, computational scientists make extensive use of e−x in computer simulation experiments. While it is common to ...
Robin Pottathuparambil, Ron Sass
107
Voted
IWANN
2009
Springer
15 years 7 months ago
Fuzzy Logic, Soft Computing, and Applications
We survey on the theoretical and practical developments of the theory of fuzzy logic and soft computing. Specifically, we briefly review the history and main milestones of fuzzy ...
Inma P. Cabrera, Pablo Cordero, Manuel Ojeda-Acieg...
113
Voted
ACSAC
1998
IEEE
15 years 4 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum