Sciweavers

24188 search results - page 447 / 4838
» Computing on Encrypted Data
Sort
View
ICDM
2002
IEEE
156views Data Mining» more  ICDM 2002»
15 years 10 months ago
On Computing Condensed Frequent Pattern Bases
Frequent pattern mining has been studied extensively. However, the effectiveness and efficiency of this mining is often limited, since the number of frequent patterns generated i...
Jian Pei, Guozhu Dong, Wei Zou, Jiawei Han
125
Voted
ICS
2010
Tsinghua U.
15 years 9 months ago
Cache oblivious parallelograms in iterative stencil computations
We present a new cache oblivious scheme for iterative stencil computations that performs beyond system bandwidth limitations as though gigabytes of data could reside in an enormou...
Robert Strzodka, Mohammed Shaheen, Dawid Pajak, Ha...
ICPP
1999
IEEE
15 years 9 months ago
Compiler Optimizations for I/O-Intensive Computations
This paper describes transformation techniques for out-of-core programs (i.e., those that deal with very large quantities of data) based on exploiting locality using a combination...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
ECAI
1992
Springer
15 years 9 months ago
A Strategy for the Computation of Conditional Answers
We consider non-Horn Deductive Data Bases (DDB) represented in a First Order language without function symbols. In this context the DDB is an incomplete description of the world. ...
Robert Demolombe
CGI
2004
IEEE
15 years 8 months ago
Face Recognition Using Computer-Generated Database
Many face database and recognition systems have been constructed in specially designed studios with various illuminations, poses, and expressions. However, none of these databases...
Won-Sook Lee, Kyung-Ah Sohn