Sciweavers

6269 search results - page 1153 / 1254
» Turning data into knowledge
Sort
View
SIGMOD
1998
ACM
97views Database» more  SIGMOD 1998»
15 years 9 months ago
Cost Based Query Scrambling for Initial Delays
Remote data access from disparate sources across a widearea network such as the Internet is problematic due to the unpredictable nature of the communications medium and the lack o...
Tolga Urhan, Michael J. Franklin, Laurent Amsaleg
AIME
1997
Springer
15 years 9 months ago
Detecting Very Early Stages of Dementia from Normal Aging with Machine Learning Methods
We used Machine Learning (ML) methods to learn the best decision rules to distinguish normal brain aging from the earliest stages of dementia using subsamples of 198 normal and 244...
William Rodman Shankle, Subramani Mani, Michael J....
CVRMED
1997
Springer
15 years 9 months ago
Design considerations for a computer-vision-enabled ophthalmic augmented reality environment
We have initiated studies towards the design and implementation of an ophthalmic augmented reality environment in order to allow for a more precise laser treatment for ophthalmic...
Jeffrey W. Berger, Michael E. Leventon, Nobuhiko H...
156
Voted
SPDP
1993
IEEE
15 years 9 months ago
How to Share an Object: A Fast Timing-Based Solution
We consider the problem of transforming a given sequential implementation of a data structure into a wait-free concurrent implementation. Given the code for different operations ...
Rajeev Alur, Gadi Taubenfeld
166
Voted
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 9 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
« Prev « First page 1153 / 1254 Last » Next »