Sciweavers

24188 search results - page 366 / 4838
» Computing on Encrypted Data
Sort
View
ISSTA
1998
ACM
15 years 8 months ago
Computation of Interprocedural Control Dependence
Program dependence information is useful for a variety of software testing and maintenance tasks. Properly defined, control and data dependencies can be used to identify semantic...
Mary Jean Harrold, Gregg Rothermel, Saurabh Sinha
142
Voted
DEXA
1998
Springer
90views Database» more  DEXA 1998»
15 years 8 months ago
On the Correctness of a Transaction Model for Mobile Computing
We discuss and prove the correctness of a transaction model for mobile computing. In our transaction model, we incorporate a prewrite operation (before a write) which does not upda...
Sanjay Kumar Madria, Bharat K. Bhargava
KDD
1997
ACM
122views Data Mining» more  KDD 1997»
15 years 8 months ago
Computing Optimized Rectilinear Regions for Association Rules
We address the problem of nding useful regions for two-dimensional association rules and decision trees. In a previous paper we presented ecient algorithms for computing optimiz...
Kunikazu Yoda, Takeshi Fukuda, Yasuhiko Morimoto, ...
147
Voted
NC
2006
132views Neural Networks» more  NC 2006»
15 years 4 months ago
Learning short multivariate time series models through evolutionary and sparse matrix computation
Multivariate Time Series (MTS) data are widely available in different fields including medicine, finance, bioinformatics, science and engineering. Modelling MTS data accurately is...
Stephen Swift, Joost N. Kok, Xiaohui Liu
PERVASIVE
2006
Springer
15 years 4 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford