Sciweavers

5344 search results - page 981 / 1069
» Privacy-Preserving Set Operations
Sort
View
CEC
2005
IEEE
15 years 7 months ago
Multiobjective clustering around medoids
Abstract- The large majority of existing clustering algorithms are centered around the notion of a feature, that is, individual data items are represented by their intrinsic proper...
Julia Handl, Joshua D. Knowles
CODES
2005
IEEE
15 years 7 months ago
CRAMES: compressed RAM for embedded systems
Memory is a scarce resource in many embedded systems. Increasing memory often increases packaging and cooling costs, size, and energy consumption. This paper presents CRAMES, an e...
Lei Yang, Robert P. Dick, Haris Lekatsas, Srimat T...
DASFAA
2005
IEEE
141views Database» more  DASFAA 2005»
15 years 7 months ago
Learning Tree Augmented Naive Bayes for Ranking
Naive Bayes has been widely used in data mining as a simple and effective classification algorithm. Since its conditional independence assumption is rarely true, numerous algorit...
Liangxiao Jiang, Harry Zhang, Zhihua Cai, Jiang Su
ICDCS
2005
IEEE
15 years 7 months ago
The Impossibility of Boosting Distributed Service Resilience
We prove two theorems saying that no distributed system in which processes coordinate using reliable registers and -resilient services can solve the consensus problem in the prese...
Paul C. Attie, Rachid Guerraoui, Petr Kouznetsov, ...
ICEIS
2005
IEEE
15 years 7 months ago
COCO: Composition Model and Composition Model Implementation
Component-based software engineering attempts to address the ever increasing demand for new software applications by enabling a compositional approach to software construction in ...
Naiyana Tansalarak, Kajal T. Claypool