Sciweavers

8655 search results - page 1461 / 1731
» Challenges for Trusted Computing
Sort
View
VLSID
2009
IEEE
108views VLSI» more  VLSID 2009»
15 years 11 months ago
Metric Based Multi-Timescale Control for Reducing Power in Embedded Systems
Abstract--Digital control for embedded systems often requires low-power, hard real-time computation to satisfy high control-loop bandwidth, low latency, and low-power requirements....
Forrest Brewer, João Pedro Hespanha, Nitin ...
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
15 years 11 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
15 years 11 months ago
Efficient closed pattern mining in the presence of tough block constraints
In recent years, various constrained frequent pattern mining problem formulations and associated algorithms have been developed that enable the user to specify various itemsetbase...
Krishna Gade, Jianyong Wang, George Karypis
99
Voted
CHI
2008
ACM
15 years 11 months ago
MQSearch: image search by multi-class query
Image search is becoming prevalent in web search as the number of digital photos grows exponentially on the internet. For a successful image search system, removing outliers in th...
Yiwen Luo, Wei Liu, Jianzhuang Liu, Xiaoou Tang
CHI
2006
ACM
15 years 11 months ago
Because I carry my cell phone anyway: functional location-based reminder applications
Although they have potential, to date location-based information systems have not radically improved the way we interact with our surroundings. To study related issues, we develop...
Pamela J. Ludford, Dan Frankowski, Ken Reily, Kurt...
« Prev « First page 1461 / 1731 Last » Next »