Sciweavers

5970 search results - page 1074 / 1194
» Management Information Model Engineering
Sort
View
ISI
2008
Springer
15 years 3 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
TASLP
2010
132views more  TASLP 2010»
14 years 10 months ago
Using Reverberation to Improve Range and Elevation Discrimination for Small Array Sound Source Localization
Sound source localization (SSL) is an essential task in many applications involving speech capture and enhancement. As such, speaker localization with microphone arrays has receive...
Flavio Ribeiro, Cha Zhang, Dinei A. F. Florê...
EMSOFT
2007
Springer
15 years 10 months ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh
CONCURRENCY
2008
119views more  CONCURRENCY 2008»
15 years 3 months ago
InterGrid: a case for internetworking islands of Grids
: Over the last few years, several nations around the world have set up Grids to share resources such as computers, data, and instruments to enable collaborative science, engineeri...
Marcos Dias de Assunção, Rajkumar Bu...
KDD
2010
ACM
217views Data Mining» more  KDD 2010»
15 years 2 months ago
Mining program workflow from interleaved traces
Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on software systems. One key problem of software main...
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, ...
« Prev « First page 1074 / 1194 Last » Next »