Sciweavers

230 search results - page 10 / 46
» Information Access Based on Associative Calculation
Sort
View
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 5 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
ADC
2004
Springer
97views Database» more  ADC 2004»
15 years 5 months ago
A Collaborative Approach for Caching Dynamic Data in Portal Applications
Portals are one of the rapidly growing applications on the Web, providing a single interface to access different sources (providers). Providing fast response time is one of the c...
Mehregan Mahdavi, John Shepherd, Boualem Benatalla...
VRST
2006
ACM
15 years 5 months ago
Limpid desk: see-through access to disorderly desktop in projection-based mixed reality
We propose Limpid Desk which supports document search on a real desktop with virtual transparentizing of the upper layer of a document stack in projection-based mixed reality (MR)...
Daisuke Iwai, Kosuke Sato
ASSETS
2006
ACM
15 years 5 months ago
A Cisco education tool accessible to the vision impaired
This paper describes iNetSim, a universally accessible network simulator, created to allow vision-impaired and sighted users to complete Cisco Certified Network Associate level tw...
J. Hope, Brian R. von Konsky, I. Murray, L. C. Che...
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 6 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar