Sciweavers

5344 search results - page 907 / 1069
» Privacy-Preserving Set Operations
Sort
View
GIS
2004
ACM
16 years 4 months ago
An abstract model of three-dimensional spatial data types
act Model of Three-Dimensional Spatial Data Types Markus Schneider & Brian E Weinrich University of Florida Department of Computer & Information Science & Engineering G...
Markus Schneider, Brian E. Weinrich
GIS
2006
ACM
16 years 4 months ago
Optimization of multiple continuous queries over streaming satellite data
Remotely sensed data, in particular satellite imagery, play many important roles in environmental applications and models. In particular applications that study (rapid) changes in...
Quinn Hart, Michael Gertz
DAC
2006
ACM
16 years 4 months ago
Timing-based delay test for screening small delay defects
The delay fault test pattern set generated by timing unaware commercial ATPG tools mostly affects very short paths, thereby increasing the escape chance of smaller delay defects. ...
Nisar Ahmed, Mohammad Tehranipoor, Vinay Jayaram
SIGSOFT
2007
ACM
16 years 4 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
138
Voted
WWW
2004
ACM
16 years 4 months ago
Shilling recommender systems for fun and profit
Recommender systems have emerged in the past several years as an effective way to help people cope with the problem of information overload. One application in which they have bec...
Shyong K. Lam, John Riedl