Sciweavers

1756 search results - page 176 / 352
» Current Directions in Hyper-Programming
Sort
View
ESORICS
2009
Springer
15 years 11 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
KDD
2009
ACM
160views Data Mining» more  KDD 2009»
15 years 11 months ago
Surveying the complementary role of automatic data analysis and visualization in knowledge discovery
The aim of this work is to survey and reflect on the various ways to integrate visualization and data mining techniques toward a mixed-initiative knowledge discovery taking the be...
Enrico Bertini, Denis Lalanne
LCTRTS
2009
Springer
15 years 11 months ago
Software transactional memory for multicore embedded systems
Embedded systems, like general-purpose systems, can benefit from parallel execution on a symmetric multicore platform. Unfortunately, concurrency issues present in general-purpos...
Jennifer Mankin, David R. Kaeli, John Ardini
PAKDD
2009
ACM
116views Data Mining» more  PAKDD 2009»
15 years 11 months ago
Scalable Web Mining with Newistic
Abstract. Newistic is a web mining platform that collects and analyses documents crawled from the Internet. Although it currently processes news articles, it can be easily adapted ...
Ovidiu Dan, Horatiu Mocian
PAKDD
2009
ACM
112views Data Mining» more  PAKDD 2009»
15 years 11 months ago
Romanization of Thai Proper Names Based on Popularity of Usages
The lack of standards for Romanization of Thai proper names makes searching activity a challenging task. This is particularly important when searching for people-related documents ...
Akegapon Tangverapong, Atiwong Suchato, Proadpran ...