Sciweavers

21876 search results - page 3993 / 4376
» Computer game-flow design
Sort
View
150
Voted
ISCI
2007
99views more  ISCI 2007»
15 years 4 months ago
Privacy-preserving algorithms for distributed mining of frequent itemsets
Standard algorithms for association rule mining are based on identification of frequent itemsets. In this paper, we study how to maintain privacy in distributed mining of frequen...
Sheng Zhong
129
Voted
TDP
2008
111views more  TDP 2008»
15 years 4 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
123
Voted
TEC
2008
100views more  TEC 2008»
15 years 4 months ago
Real-Valued Compact Genetic Algorithms for Embedded Microcontroller Optimization
Recent research on compact genetic algorithms (cGAs) has proposed a number of evolutionary search methods with reduced memory requirements. In cGAs, the evolution of populations is...
Ernesto Mininno, Francesco Cupertino, David Naso
137
Voted
ISJGP
2007
146views more  ISJGP 2007»
15 years 4 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
TIP
2008
116views more  TIP 2008»
15 years 4 months ago
Self-Repelling Snakes for Topology-Preserving Segmentation Models
The implicit framework of the level-set method has several advantages when tracking propagating fronts. Indeed, the evolving contour is embedded in a higher dimensional level-set f...
Carole Le Guyader, Luminita A. Vese
« Prev « First page 3993 / 4376 Last » Next »