Sciweavers

1076 search results - page 193 / 216
» Operations on proofs and labels
Sort
View
SRDS
2010
IEEE
14 years 11 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
TMC
2011
131views more  TMC 2011»
14 years 8 months ago
In-Network Computation in Random Wireless Networks: A PAC Approach to Constant Refresh Rates with Lower Energy Costs
—We propose a method to compute a probably approximately correct (PAC) normalized histogram of observations with a refresh rate of Âð1Þ time units per histogram sample on a ra...
Srikanth K. Iyer, D. Manjunath, R. Sundaresan
139
Voted
POPL
2012
ACM
13 years 9 months ago
Programming with binders and indexed data-types
We show how to combine a general purpose type system for an existing language with support for programming with binders and contexts by refining the type system of ML with a rest...
Andrew Cave, Brigitte Pientka
166
Voted
TEI
2012
ACM
331views Hardware» more  TEI 2012»
13 years 9 months ago
Body-centric interaction with mobile devices
Most current mobile technologies require on-screen operations for interacting with devices’ visual contents. However, as a trade-off for mobility, screens usually provide limite...
Xiang 'Anthony' Chen
KDD
2008
ACM
153views Data Mining» more  KDD 2008»
16 years 2 months ago
Text classification, business intelligence, and interactivity: automating C-Sat analysis for services industry
Text classification has matured as a research discipline over the last decade. Independently, business intelligence over structured databases has long been a source of insights fo...
Shantanu Godbole, Shourya Roy