Sciweavers

6388 search results - page 1182 / 1278
» High Performance Data Mining
Sort
View
154
Voted
CCS
2008
ACM
15 years 6 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
KRDB
1998
93views Database» more  KRDB 1998»
15 years 5 months ago
Intelligent Caching for Information Mediators: A KR Based Approach
We present a semantic caching approach for optimizing the performance of information mediators. A critical problem with information mediators, particularly those gathering and int...
Naveen Ashish, Craig A. Knoblock, Cyrus Shahabi
159
Voted
MVA
1990
162views Computer Vision» more  MVA 1990»
15 years 5 months ago
Map-Driven Image Interpretation by Associative Model Indexing
d at a high abstraction level, and consists in an expectation-driven search starting from symbolic object descriptions and using a version of a distributed blackboard system for re...
Gian Luca Foresti, Vittorio Murino, Carlo S. Regaz...
SAC
2010
ACM
15 years 4 months ago
TransPeer: adaptive distributed transaction monitoring for Web2.0 applications
In emerging Web2.0 applications such as virtual worlds or social networking websites, the number of users is very important (tens of thousands), hence the amount of data to manage...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
BMCBI
2010
65views more  BMCBI 2010»
15 years 4 months ago
VIPR: A probabilistic algorithm for analysis of microbial detection microarrays
Background: All infectious disease oriented clinical diagnostic assays in use today focus on detecting the presence of a single, well defined target agent or a set of agents. In r...
Adam F. Allred, Guang Wu, Tuya Wulan, Kael F. Fisc...
« Prev « First page 1182 / 1278 Last » Next »