Sciweavers

8491 search results - page 1450 / 1699
» Forecasting in Database Systems
Sort
View
CCS
2008
ACM
15 years 6 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
DFN
2009
15 years 6 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
ICASSP
2010
IEEE
15 years 5 months ago
Using cross-decoder phone coocurrences in phonotactic language recognition
Phonotactic language recognizers are based on the ability of phone decoders to produce phone sequences containing acoustic, phonetic and phonological information, which is partial...
Mikel Peñagarikano, Amparo Varona, Luis Jav...
CORR
2010
Springer
214views Education» more  CORR 2010»
15 years 5 months ago
Hybrid Medical Image Classification Using Association Rule Mining with Decision Tree Algorithm
The main focus of image mining in the proposed method is concerned with the classification of brain tumor in the CT scan brain images. The major steps involved in the system are: p...
P. Rajendran, M. Madheswaran
152
Voted
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 5 months ago
ElasTraS: An Elastic Transactional Data Store in the Cloud
Over the last couple of years, "Cloud Computing" or "Elastic Computing" has emerged as a compelling and successful paradigm for internet scale computing. One o...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
« Prev « First page 1450 / 1699 Last » Next »