Sciweavers

6770 search results - page 246 / 1354
» How GPUs Work
Sort
View
139
Voted
ISCI
2007
99views more  ISCI 2007»
15 years 3 months ago
Privacy-preserving algorithms for distributed mining of frequent itemsets
Standard algorithms for association rule mining are based on identification of frequent itemsets. In this paper, we study how to maintain privacy in distributed mining of frequen...
Sheng Zhong
136
Voted
TMC
2008
112views more  TMC 2008»
15 years 3 months ago
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network
Sensor deployment is a critical issue because it affects the cost and detection capability of a wireless sensor network. In this work, we consider two related deployment problems: ...
You-Chiun Wang, Chun-Chi Hu, Yu-Chee Tseng
ENTCS
2002
78views more  ENTCS 2002»
15 years 3 months ago
Separating concerns in a high-level component-based context
Building on the work of architectural description languages and aspect-oriented programming, we try to improve current visual component composition environments. In our , we intro...
Wim Vanderperren, Bart Wydaeghe
116
Voted
PUC
2007
96views more  PUC 2007»
15 years 3 months ago
When home base is not a place: parents' use of mobile telephones
Abstract More attention is being paid to the development of information and communication technologies (ICTs) that are sensitive to the needs of people in their homes. By studying ...
Leysia Palen, Amanda L. Hughes
149
Voted
COGSCI
2008
75views more  COGSCI 2008»
15 years 2 months ago
Exemplars, Prototypes, Similarities, and Rules in Category Representation: An Example of Hierarchical Bayesian Analysis
This article demonstrates the potential of using hierarchical Bayesian methods to relate models and data in the cognitive sciences. This is done using a worked example that consid...
Michael D. Lee, Wolf Vanpaemel