Sciweavers

1396 search results - page 165 / 280
» aim 2006
Sort
View
78
Voted
ISBI
2006
IEEE
16 years 1 months ago
Joint texture and topography estimation for extended depth of field in brightfield microscopy
Brightfield microscopy often suffers from limited depth of field, which prevents thick specimens from being imaged entirely in-focus. By optically sectioning the specimen, the inf...
François Aguet, Dimitri Van De Ville, Micha...
98
Voted
WWW
2006
ACM
16 years 1 months ago
An e-market framework for informed trading
Fully automated trading, such as e-procurement, using the Internet is virtually unheard of today. Three core technologies are needed to fully automate the trading process: data mi...
John K. Debenham, Simeon J. Simoff
107
Voted
WWW
2006
ACM
16 years 1 months ago
The SOWES approach to P2P web search using semantic overlays
Peer-to-peer (P2P) Web search has gained a lot of interest lately, due to the salient characteristics of P2P systems, namely scalability, fault-tolerance and load-balancing. Howev...
Christos Doulkeridis, Kjetil Nørvåg, ...
WWW
2006
ACM
16 years 1 months ago
WAP5: black-box performance debugging for wide-area systems
Wide-area distributed applications are challenging to debug, optimize, and maintain. We present Wide-Area Project 5 (WAP5), which aims to make these tasks easier by exposing the c...
Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogu...
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
16 years 1 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...