Sciweavers

7163 search results - page 1348 / 1433
» Privacy-Preserving Data Mining
Sort
View
ICPP
2006
IEEE
15 years 4 months ago
Adaptively Routing P2P Queries Using Association Analysis
Unstructured peer-to-peer networks have become a very popular method for content distribution in the past few years. By not enforcing strict rules on the network’s topology or c...
Brian D. Connelly, Christopher W. Bowron, Li Xiao,...
ISESE
2006
IEEE
15 years 4 months ago
Using observational pilot studies to test and improve lab packages
Controlled experiments are a key approach to evaluate and evolve our understanding of software engineering technologies. However, defining and running a controlled experiment is a...
Manoel G. Mendonça, Daniela Cruzes, Josemei...
WETICE
2006
IEEE
15 years 3 months ago
Co-Presence Communities: Using Pervasive Computing to Support Weak Social Networks
Although the strongest social relationships feature most prominently in our lives, we also maintain a multitude of much weaker connections: the distant colleagues that we share a ...
Jamie Lawrence, Terry R. Payne, David De Roure
MM
2006
ACM
250views Multimedia» more  MM 2006»
15 years 3 months ago
Effective and efficient object-based image retrieval using visual phrases
In this paper, we draw an analogy between image retrieval and text retrieval and propose a visual phrase-based approach to retrieve images containing desired objects. The visual p...
Qing-Fang Zheng, Wei-Qiang Wang, Wen Gao
CEC
2005
IEEE
15 years 3 months ago
Parallel evolutionary algorithms on graphics processing unit
Evolutionary Algorithms (EAs) are effective and robust methods for solving many practical problems such as feature selection, electrical circuits synthesis, and data mining. Howeve...
Man Leung Wong, Tien-Tsin Wong, Ka-Ling Fok
« Prev « First page 1348 / 1433 Last » Next »