Sciweavers

3352 search results - page 496 / 671
» Complex Data Integration Based on a Multi-agent System
Sort
View
SIGCOMM
2010
ACM
15 years 4 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
TVCG
2011
146views more  TVCG 2011»
14 years 11 months ago
Visibility Histograms and Visibility-Driven Transfer Functions
—Direct volume rendering is an important tool for visualizing complex data sets. However, in the process of generating 2D images from 3D data, information is lost in the form of ...
Carlos D. Correa, Kwan-Liu Ma
DATAMINE
2002
135views more  DATAMINE 2002»
15 years 4 months ago
Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization
: Web usage mining, possibly used in conjunction with standard approaches to personalization such as collaborative filtering, can help address some of the shortcomings of these tec...
Bamshad Mobasher, Honghua Dai, Tao Luo, Miki Nakag...
BMCBI
2005
169views more  BMCBI 2005»
15 years 4 months ago
Genetic interaction motif finding by expectation maximization - a novel statistical model for inferring gene modules from synthe
Background: Synthetic lethality experiments identify pairs of genes with complementary function. More direct functional associations (for example greater probability of membership...
Yan Qi 0003, Ping Ye, Joel S. Bader
HIPEAC
2005
Springer
15 years 10 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee