Sciweavers

5131 search results - page 878 / 1027
» Heterogeneous Component Analysis
Sort
View
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
15 years 4 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork
DSOM
2005
Springer
15 years 4 months ago
Control Considerations for Scalable Event Processing
The growth in the scale of systems and networks has created many challenges for their management, especially for event processing. Our premise is that scaling event processing requ...
Wei Xu, Joseph L. Hellerstein, Bill Kramer, David ...
EGC
2005
Springer
15 years 4 months ago
Transparent Fault Tolerance for Grid Applications
A major challenge facing grid applications is the appropriate handling of failures. In this paper we address the problem of making parallel Java applications based on Remote Method...
Pawel Garbacki, Bartosz Biskupski, Henri E. Bal
ICWL
2005
Springer
15 years 4 months ago
Grounding Collaborative Knowledge Building in Semantics-Based Critiquing
In this paper we investigate the use of Latent Semantic Analysis (LSA), Critiquing Systems, and Knowledge Building to support computerbased teaching of English composition. We have...
Anders I. Mørch, William K. Cheung, Kelvin ...
ISNN
2005
Springer
15 years 4 months ago
An Improvement on PCA Algorithm for Face Recognition
Principle Component Analysis (PCA) technique is an important and well-developed area of image recognition and to date many linear discrimination methods have been put forward. Desp...
Vo Dinh Minh Nhat, Sungyoung Lee