Sciweavers

24188 search results - page 395 / 4838
» Computing on Encrypted Data
Sort
View
JUCS
2008
140views more  JUCS 2008»
15 years 4 months ago
The Computable Multi-Functions on Multi-represented Sets are Closed under Programming
: In the representation approach to computable analysis (TTE) [Grz55, i00], abstract data like rational numbers, real numbers, compact sets or continuous real functions are represe...
Klaus Weihrauch
ICDM
2007
IEEE
174views Data Mining» more  ICDM 2007»
15 years 11 months ago
Targeting Input Data for Acoustic Bird Species Recognition Using Data Mining and HMMs
In this paper we propose the integration of Data Mining with Hidden Markov Models when applied to the problem of acoustic bird species recognition. We first show how each of them...
Erika Vilches, Ivan A. Escobar, Edgar E. Vallejo, ...
INTELLCOMM
2004
Springer
15 years 10 months ago
Triple-Space Computing: Semantic Web Services Based on Persistent Publication of Information
This paper discusses possible routes to moving the web from a collection of human readable pieces of information connecting humans, to a web that connects computing devices based o...
Dieter Fensel
CHI
2005
ACM
16 years 5 months ago
tranSticks: physically manipulatable virtual connections
A virtually connected medium called tranStick is described that functions both as a "virtual wire" and as a "memory card" containing a shared space. A user can...
Yuji Ayatsuka, Jun Rekimoto
CSE
2009
IEEE
15 years 11 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner