Sciweavers

11065 search results - page 2191 / 2213
» Education
Sort
View
ISI
2008
Springer
14 years 11 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
COMPUTER
2007
153views more  COMPUTER 2007»
14 years 11 months ago
The Discipline of Embedded Systems Design
ems, using abstractions that actually remove physical constraints from consideration. At the other, embedded systems design goes beyond the traditional expertise of electrical engi...
Thomas A. Henzinger, Joseph Sifakis
IWC
2008
99views more  IWC 2008»
14 years 11 months ago
Pedagogy and usability in interactive algorithm visualizations: Designing and evaluating CIspace
Interactive algorithm visualizations (AVs) are powerful tools for teaching and learning concepts that are difficult to describe with static media alone. However, while countless A...
Saleema Amershi, Giuseppe Carenini, Cristina Conat...
JNW
2008
83views more  JNW 2008»
14 years 11 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
JBI
2006
140views Bioinformatics» more  JBI 2006»
14 years 11 months ago
Chester: Towards a personal medication advisor
Dialogue systems for health communication hold out the promise of providing intelligent assistance to patients through natural interfaces that require no training to use. But in o...
James F. Allen, George Ferguson, Nate Blaylock, Do...
« Prev « First page 2191 / 2213 Last » Next »