Sciweavers

5344 search results - page 255 / 1069
» Privacy-Preserving Set Operations
Sort
View
PVLDB
2010
195views more  PVLDB 2010»
14 years 10 months ago
Trie-Join: Efficient Trie-based String Similarity Joins with Edit-Distance Constraints
A string similarity join finds similar pairs between two collections of strings. It is an essential operation in many applications, such as data integration and cleaning, and has ...
Jiannan Wang, Guoliang Li, Jianhua Feng
ARC
2012
Springer
317views Hardware» more  ARC 2012»
13 years 11 months ago
A High Throughput FPGA-Based Implementation of the Lanczos Method for the Symmetric Extremal Eigenvalue Problem
Iterative numerical algorithms with high memory bandwidth requirements but medium-size data sets (matrix size ∼ a few 100s) are highly appropriate for FPGA acceleration. This pap...
Abid Rafique, Nachiket Kapre, George A. Constantin...
172
Voted
CODASPY
2012
13 years 11 months ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner
178
Voted
LATA
2012
Springer
13 years 11 months ago
Conservative Groupoids Recognize Only Regular Languages
The notion of recognition of a language by a finite semigroup can be generalized to recognition by finite groupoids, i.e. sets equipped with a binary operation ‘·’ which is ...
Danny Dubé, Mario Latendresse, Pascal Tesso...
163
Voted
TMA
2012
Springer
254views Management» more  TMA 2012»
13 years 11 months ago
Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data
Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
Pierdomenico Fiadino, Danilo Valerio, Fabio Riccia...