Sciweavers

10412 search results - page 1794 / 2083
» The efficiency of algorithms - misconceptions
Sort
View
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
15 years 7 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
167
Voted
BMEI
2008
IEEE
15 years 7 months ago
Clustering of High-Dimensional Gene Expression Data with Feature Filtering Methods and Diffusion Maps
The importance of gene expression data in cancer diagnosis and treatment by now has been widely recognized by cancer researchers in recent years. However, one of the major challen...
Rui Xu, Steven Damelin, Boaz Nadler, Donald C. Wun...
CAISE
2008
Springer
15 years 7 months ago
Round-Trip Engineering for Maintaining Conceptual-Relational Mappings
Conceptual-relational mappings between conceptual models and relational schemas have been used increasingly to achieve interoperability or overcome impedance mismatch in modern dat...
Yuan An, Xiaohua Hu, Il-Yeol Song
CASES
2008
ACM
15 years 7 months ago
Compiling custom instructions onto expression-grained reconfigurable architectures
While customizable processors aim at combining the flexibility of general purpose processors with the speed and power advantages of custom circuits, commercially available process...
Paolo Bonzini, Giovanni Ansaloni, Laura Pozzi
CAV
2008
Springer
108views Hardware» more  CAV 2008»
15 years 7 months ago
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis
This paper addresses the analysis of concurrent programs with shared memory. Such an analysis is undecidable in the presence of multiple procedures. One approach used in recent wor...
Akash Lal, Thomas W. Reps
« Prev « First page 1794 / 2083 Last » Next »