Sciweavers

1145 search results - page 20 / 229
» Design and implementation of a data mining grid-aware archit...
Sort
View
JCP
2008
119views more  JCP 2008»
15 years 18 days ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
15 years 4 months ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto
118
Voted
AEI
2004
132views more  AEI 2004»
15 years 15 days ago
An adaptive website system to improve efficiency with web mining techniques
The paper proposes an adaptive web system--that is, a website that is capable of changing its original design to fit user requirements. For the purpose of improving shortcomings o...
Ji-Hyun Lee, Wei-Kun Shiu
114
Voted
CBMS
2007
IEEE
15 years 7 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
112
Voted
SIGCOMM
2010
ACM
15 years 25 days ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long