Sciweavers

24529 search results - page 403 / 4906
» Computing on Authenticated Data
Sort
View
IADIS
2004
15 years 6 months ago
A Framework for Symbolic Distributed Computer-Aided Design over the Internet
Economical globalization and outsourcing have inspired the surge of research in distributed computer-aided design. This paper presents a framework for Internet-based symbolic dist...
Yingcai Xiao, Shivakumar Kubendrachari
ISCI
2007
130views more  ISCI 2007»
15 years 4 months ago
Computing with words and its relationships with fuzzistics
ct 9 Words mean different things to different people, and so are uncertain. We, therefore, need a fuzzy set model for a word 10 that has the potential to capture their uncertaint...
Jerry M. Mendel
ISB
2002
140views more  ISB 2002»
15 years 4 months ago
Computer system "Gene Discovery" for promoter structure analysis
Data Mining and Knowledge Discovery techniques proved to be efficient tools for variety of complex tasks in biology including DNA research. This paper presents implementation of th...
Eugenii E. Vityaev, Yuri L. Orlov, Oleg V. Vishnev...
CIKM
2011
Springer
14 years 4 months ago
Scalable entity matching computation with materialization
Entity matching (EM) is the task of identifying records that refer to the same real-world entity from different data sources. While EM is widely used in data integration and data...
Sanghoon Lee, Jongwuk Lee, Seung-won Hwang
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
15 years 9 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...