Sciweavers

5344 search results - page 354 / 1069
» Privacy-Preserving Set Operations
Sort
View
JCP
2008
135views more  JCP 2008»
15 years 4 months ago
Hybrid Evolutionary Algorithm Based Solution for Register Allocation for Embedded Systems
Embedded systems have an ever-increasing need for optimizing compilers to produce high quality codes with a limited general purpose register set. Either memory or registers are use...
Anjali Mahajan, M. S. Ali
IR
2006
15 years 4 months ago
A decision mechanism for the selective combination of evidence in topic distillation
The combination of evidence can increase retrieval effectiveness. In this paper, we investigate the effectiveness of a decision mechanism for the selective combination of evidence...
Vassilis Plachouras, Fidel Cacheda, Iadh Ounis
DKE
2007
89views more  DKE 2007»
15 years 4 months ago
The effect of threshold values on association rule based classification accuracy
Classification Association Rule Mining (CARM) systems operate by applying an Association Rule Mining (ARM) method to obtain classification rules from a training set of previousl...
Frans Coenen, Paul H. Leng
JFP
2006
88views more  JFP 2006»
15 years 4 months ago
Type-based confinement
Confinement properties impose a structure on object graphs which can be used to enforce encapsulation properties. From a practical point of view, encapsulation is essential for bu...
Tian Zhao, Jens Palsberg, Jan Vitek
JODL
2006
87views more  JODL 2006»
15 years 4 months ago
Location-based services in ubiquitous computing environments
This paper presents a framework for providing dynamically deployable services in ubiquitous computing settings. The goal of the framework is to provide people, places, and objects ...
Ichiro Satoh