Sciweavers

5344 search results - page 395 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICAPR
2005
Springer
15 years 10 months ago
Recognition Tasks Are Imitation Games
There is need for more formal specification of recognition tasks. Currently, it is common to use labeled training samples to illustrate the task to be performed. The mathematical ...
Richard Zanibbi, Dorothea Blostein, James R. Cordy
GG
2004
Springer
15 years 10 months ago
Analysis of Metabolic Pathways by Graph Transformation
Biochemical pathways, such as metabolic, regulatory, and signal transduction pathways, constitute complex networks of functional and physical interactions between molecular species...
Francesc Rosselló, Gabriel Valiente
VISUALIZATION
2003
IEEE
15 years 10 months ago
Acceleration Techniques for GPU-based Volume Rendering
Nowadays, direct volume rendering via 3D textures has positioned itself as an efficient tool for the display and visual analysis of volumetric scalar fields. It is commonly acce...
Jens Krüger, Rüdiger Westermann
111
Voted
SIGCOMM
2003
ACM
15 years 10 months ago
A routing underlay for overlay networks
We argue that designing overlay services to independently probe the Internet—with the goal of making informed application-specific routing decisions—is an untenable strategy....
Akihiro Nakao, Larry L. Peterson, Andy C. Bavier
CIKM
2003
Springer
15 years 10 months ago
Hierarchical graph indexing
Traffic analysis, in the context of Telecommunications or Internet and Web data, is crucial for large network operations. Data in such networks is often provided as large graphs w...
James Abello, Yannis Kotidis