Sciweavers

1286 search results - page 186 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
ICIP
2009
IEEE
14 years 8 months ago
Efficient Multivariate Skellam Shrinkage For Denoising Photon-limited Image Data: An Empirical Bayes Approach
In this article we address the issue of denoising photon-limited image data by deriving new and efficient multivariate Bayesian estimators that approximate the conditional expecta...
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
14 years 8 months ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...

Book
688views
15 years 5 months ago
Database Management Systems
A set of presentations covering the book, which includes the following topics ER Model and Conceptual Design, The Relational Model and SQL DDL, Relational Algebra, SQL, Database Ap...
Raghu Ramakrishnan, Johannes Gehrke
GCC
2005
Springer
14 years 1 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao
ICDM
2006
IEEE
154views Data Mining» more  ICDM 2006»
14 years 1 months ago
Mining and Predicting Duplication over Peer-to-Peer Query Streams
Many previous works of data mining user queries in Peer-to-Peer systems focused their attention on the distribution of query contents. However, few has been done towards a better ...
Shicong Meng, Yifeng Shao, Cong Shi, Dingyi Han, Y...