Sciweavers

24529 search results - page 243 / 4906
» Computing on Authenticated Data
Sort
View
149
Voted
WMASH
2003
ACM
15 years 8 months ago
Wireless hotspots: current challenges and future directions
In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users an...
Anand Balachandran, Geoffrey M. Voelker, Paramvir ...
158
Voted
PC
1998
125views Management» more  PC 1998»
15 years 3 months ago
A High-Performance Active Digital Library
We describe Javaflow and Paraflow, the client and server parts of a digital library, providing high-performance data-retrieval and data-mining services, with emphasis on user in...
Roy Williams, Bruce Sears
KDD
1998
ACM
75views Data Mining» more  KDD 1998»
15 years 7 months ago
Knowledge Discovery and the Interface of Computing and Statistics
Brief but stimulatingoverviewsarepresented to placeknowledgediscoveryanddatamining (KDD) in the dataanalysisandresearchcycles:
Arnold Goodman, John F. Elder IV
133
Voted
DMIN
2006
125views Data Mining» more  DMIN 2006»
15 years 5 months ago
Biomedical Hypothesis Generation and Testing by Evolutionary Computation
- Filtering the immense amount of data available electronically over the World Wide Web is an important task of search engines in data mining applications. Users when performing se...
Robert Kozma, Anna L. Buczak
131
Voted
ICICS
2009
Springer
15 years 10 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson