Sciweavers

24529 search results - page 339 / 4906
» Computing on Authenticated Data
Sort
View
NCA
2007
IEEE
15 years 3 months ago
Handling of incomplete data sets using ICA and SOM in data mining
Based on independent component analysis (ICA) and self-organizing maps (SOM), this paper proposes an ISOM-DH model for the incomplete data’s handling in data mining. Under these ...
Hongyi Peng, Siming Zhu
CCGRID
2007
IEEE
15 years 10 months ago
A Service-Oriented System to Support Data Integration on Data Grids
Data Grids provide transparent access to heterogeneous and autonomous data resources. The main contribution of this paper is the presentation of a data sharing system that (i) is ...
Anastasios Gounaris, Carmela Comito, Rizos Sakella...
DAC
1997
ACM
15 years 8 months ago
Data Memory Minimisation for Synchronous Data Flow Graphs Emulated on DSP-FPGA Targets
The paper presents an algorithm to determine the close-tosmallest possible data buffer sizes for arbitrary synchronous data flow (SDF) applications, such that we can guarantee the...
Marleen Adé, Rudy Lauwereins, J. A. Peperst...
SAC
2006
ACM
15 years 10 months ago
Discretization from data streams: applications to histograms and data mining
Abstract. In this paper we propose a new method to perform incremental discretization. The basic idea is to perform the task in two layers. The first layer receives the sequence o...
João Gama, Carlos Pinto
WWW
2005
ACM
16 years 4 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten