Sciweavers

444 search results - page 79 / 89
» Sensitive state-space exploration
Sort
View
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
15 years 6 months ago
Identifying graphs from noisy and incomplete data
There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biologic...
Galileo Mark S. Namata Jr., Lise Getoor
88
Voted
IDEAS
2009
IEEE
192views Database» more  IDEAS 2009»
15 years 6 months ago
A cluster-based approach to XML similarity joins
A natural consequence of the widespread adoption of XML as standard for information representation and exchange is the redundant storage of large amounts of persistent XML documen...
Leonardo Ribeiro, Theo Härder, Fernanda S. Pi...
MICRO
2009
IEEE
124views Hardware» more  MICRO 2009»
15 years 6 months ago
ZerehCache: armoring cache architectures in high defect density technologies
Aggressive technology scaling to 45nm and below introduces serious reliability challenges to the design of microprocessors. Large SRAM structures used for caches are particularly ...
Amin Ansari, Shantanu Gupta, Shuguang Feng, Scott ...
NDSS
2008
IEEE
15 years 6 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ICASSP
2007
IEEE
15 years 6 months ago
A Multi-Subject, Dynamic Bayesian Networks (DBNS) Framework for Brain Effective Connectivity
As dynamic connectivity is shown essential for normal brain function and is disrupted in disease, it is critical to develop models for inferring brain effective connectivity from ...
Junning Li, Z. Jane Wang, Martin J. McKeown