Sciweavers

2631 search results - page 288 / 527
» Less is More
Sort
View
EDBT
2008
ACM
172views Database» more  EDBT 2008»
16 years 4 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
112
Voted
ICSE
2007
IEEE-ACM
16 years 4 months ago
Do Maintainers Utilize Deployed Design Patterns Effectively?
One claimed benefit of deploying design patterns is facilitating maintainers to perform anticipated changes. However, it is not at all obvious that the relevant design patterns de...
T. H. Ng, S. C. Cheung, W. K. Chan, Y. T. Yu
PERCOM
2005
ACM
16 years 3 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
DCC
2005
IEEE
16 years 3 months ago
Efficient Alphabet Partitioning Algorithms for Low-Complexity Entropy Coding
We analyze the technique for reducing the complexity of entropy coding consisting in the a priori grouping of the source alphabet symbols, and in dividing the coding process in tw...
Amir Said
ICWS
2009
IEEE
16 years 1 months ago
Towards Automated RESTful Web Service Composition
Emerging as the popular choice for leading Internet companies to expose internal data and resources, RESTful Web services are attracting increasing attention in the industry. Whil...
Haibo Zhao, Prashant Doshi