Sciweavers

10909 search results - page 162 / 2182
» Evaluating Backup Algorithms
Sort
View
ESORICS
2009
Springer
16 years 4 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
CIKM
2009
Springer
15 years 10 months ago
Towards non-directional Xpath evaluation in a RDBMS
XML query languages use directional path expressions to locate data in an XML data collection. They are tightly coupled to the structure of a data collection, and can fail when ev...
Sourav S. Bhowmick, Curtis E. Dyreson, Erwin Leona...
IROS
2008
IEEE
110views Robotics» more  IROS 2008»
15 years 10 months ago
Interacting with a mobile robot: Evaluating gestural object references
— Creating robots able to interact and cooperate with humans in household environments and everyday life is an emerging topic. Our goal is to facilitate a humanlike and intuitive...
Joachim Schmidt, Nils Hofemann, Axel Haasch, Janni...
INFOCOM
2006
IEEE
15 years 10 months ago
Evaluating Mobility Pattern Space Routing for DTNs
— Because a delay tolerant network (DTN) can often be partitioned, routing is a challenge. However, routing benefits considerably if one can take advantage of knowledge concerni...
Jeremie Leguay, Timur Friedman, Vania Conan
DAWAK
2006
Springer
15 years 7 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro