Sciweavers

140 search results - page 7 / 28
» The anatomy of big data computing
Sort
View
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
15 years 9 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
PARA
2004
Springer
15 years 2 months ago
A Cache-Aware Algorithm for PDEs on Hierarchical Data Structures
A big challenge in implementing up to date simulation software for various applications is to bring together highly efficient mathematical methods on the one hand side and an ef...
Frank Günther, Miriam Mehl, Markus Pögl,...
CSCWD
2006
Springer
15 years 1 months ago
WFMS-based Data Integration for e-Learning
As more and more organisations and institutions are moving towards the e-learning strategy, more and more disparate data are distributed by different e-learning systems. How to ef...
Jianming Yong, Jun Yan, Xiaodi Huang
97
Voted
IEEEICCI
2005
IEEE
15 years 3 months ago
A brain-like computer for cognitive software applications: the Ersatz Brain project
We want to design a suitable computer for the efficient execution of the software now being developed that will display human-like cognitive abilities. Examples of these potential...
J. A. Anderson
MICCAI
2010
Springer
14 years 7 months ago
Value-Based Noise Reduction for Low-Dose Dual-Energy Computed Tomography
Abstract. We introduce a value-based noise reduction method for DualEnergy CT applications. It is based on joint intensity statistics estimated from high- and low-energy CT scans o...
Michael Balda, Björn Heismann, Joachim Horneg...