Sciweavers

152 search results - page 30 / 31
» A Tutorial on the Cross-Entropy Method
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 2 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
DIS
2005
Springer
14 years 26 days ago
The Arrowsmith Project: 2005 Status Report
In the 1980s, Don Swanson proposed the concept of “undiscovered public knowledge,” and published several examples in which two disparate literatures (i.e., sets of articles hav...
Neil R. Smalheiser
CCGRID
2001
IEEE
13 years 11 months ago
Cluster Computing in the Classroom: Topics, Guidelines, and Experiences
- With the progress of research on cluster computing, more and more universities have begun to offer various courses covering cluster computing. A wide variety of content can be ta...
Amy W. Apon, Rajkumar Buyya, Hai Jin, Jens Mache
BMCBI
2007
123views more  BMCBI 2007»
13 years 7 months ago
BIRCH: A user-oriented, locally-customizable, bioinformatics system
Background: Molecular biologists need sophisticated analytical tools which often demand extensive computational resources. While finding, installing, and using these tools can be ...
Brian Fristensky
CN
2000
130views more  CN 2000»
13 years 7 months ago
Automating Web navigation with the WebVCR
Recent developments in Web technology such as the inclusion of scripting languages, frames, and the growth of dynamic content, have made the process of retrieving Web content more...
Vinod Anupam, Juliana Freire, Bharat Kumar, Daniel...