Sciweavers

4323 search results - page 624 / 865
» Callback Implementations in C
Sort
View
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
15 years 5 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
137
Voted
ICFP
2010
ACM
15 years 5 months ago
Regular, shape-polymorphic, parallel arrays in Haskell
We present a novel approach to regular, multi-dimensional arrays in Haskell. The main highlights of our approach are that it (1) is purely functional, (2) supports reuse through s...
Gabriele Keller, Manuel M. T. Chakravarty, Roman L...
125
Voted
CCGRID
2010
IEEE
15 years 4 months ago
Gridifying a Diffusion Tensor Imaging Analysis Pipeline
—Diffusion Tensor MRI (DTI) is a rather recent image acquisition modality that can help identify disease processes in nerve bundles in the brain. Due to the large and complex nat...
Matthan W. A. Caan, Frans M. Vos, Antoine H. C. va...
MM
2010
ACM
186views Multimedia» more  MM 2010»
15 years 4 months ago
Hybrid load balancing for online games
As massively multiplayer online games are becoming very popular, how to support a large number of concurrent users while maintaining the game performance has become an important r...
Rynson W. H. Lau
MOBICOM
2010
ACM
15 years 4 months ago
Side channel: bits over interference
Interference is a critical issue in wireless communications. In a typical multiple-user environment, different users may severely interfere with each other. Coordination among use...
Kaishun Wu, Haoyu Tan, Yunhuai Liu, Jin Zhang, Qia...