Sciweavers

4651 search results - page 245 / 931
» Data Reduction Using Multiple Models Integration
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 8 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
ICSOC
2007
Springer
15 years 9 months ago
Let It Flow: Building Mashups with Data Processing Pipelines
Mashups are a new kind of interactive Web application, built out of the composition of two or more existing Web service APIs and data sources. Whereas “pure” mashups are built ...
Biörn Biörnstad, Cesare Pautasso
INFOCOM
2010
IEEE
15 years 16 days ago
A Greedy Link Scheduler for Wireless Networks with Gaussian Multiple Access and Broadcast Channels
Information theoretic Broadcast Channels (BC) and Multiple Access Channels (MAC) enable a single node to transmit data simultaneously to multiple nodes, and multiple nodes to trans...
Arun Sridharan, Can Emre Koksal, Elif Uysal-Biyiko...
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
15 years 7 months ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...
143
Voted
TITS
2011
165views more  TITS 2011»
14 years 10 months ago
Analysis of Real-World Driver's Frustration
—This study investigates a method for estimating a driver’s spontaneous frustration in the real world. In line with a specific definition of emotion, the proposed method inte...
Lucas Malta, Chiyomi Miyajima, Norihide Kitaoka, K...