Sciweavers

24529 search results - page 413 / 4906
» Computing on Authenticated Data
Sort
View
153
Voted
ICDM
2007
IEEE
156views Data Mining» more  ICDM 2007»
15 years 8 months ago
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors
This paper addresses the task of change analysis of correlated multi-sensor systems. The goal of change analysis is to compute the anomaly score of each sensor when we know that t...
Tsuyoshi Idé, Spiros Papadimitriou, Michail...
COOPIS
2004
IEEE
15 years 8 months ago
SPREE: Object Prefetching for Mobile Computers
Mobile platforms combined with large databases promise new opportunities for mobile applications. However, mobile computing devices may experience frequent communication loss while...
Kristian Kvilekval, Ambuj K. Singh
DICS
2006
15 years 8 months ago
Autonomic Computing for Virtual Laboratories
Virtual laboratories can be characterized by their long-lasting, large-scale computations, where a collection of heterogeneous tools is integrated into data processing pipelines. S...
Cesare Pautasso, Win Bausch, Gustavo Alonso
HPCN
1995
Springer
15 years 8 months ago
Using optimistic execution techniques as a parallelisation tool for general purpose computing
Abstract. Optimistic execution techniques are widely used in the field of parallel discrete event simulation. In this paper we discuss the use of optimism as a technique for paral...
Adam Back, Stephen Turner
134
Voted
EDM
2008
93views Data Mining» more  EDM 2008»
15 years 6 months ago
A Preliminary Analysis of the Logged Questions that Students Ask in Introductory Computer Science
Asking questions is widely believed to contribute to student learning, but little is known about the questions that students ask or how to exploit them in tutorial interventions to...
Cecily Heiner