Sciweavers

5456 search results - page 1061 / 1092
» A study of Object Evolution
Sort
View
SDM
2008
SIAM
147views Data Mining» more  SDM 2008»
14 years 11 days ago
The Asymmetric Approximate Anytime Join: A New Primitive with Applications to Data Mining
It has long been noted that many data mining algorithms can be built on top of join algorithms. This has lead to a wealth of recent work on efficiently supporting such joins with ...
Lexiang Ye, Xiaoyue Wang, Dragomir Yankov, Eamonn ...
MEDINFO
2007
132views Healthcare» more  MEDINFO 2007»
14 years 11 days ago
Comparing Decision Support Methodologies for Identifying Asthma Exacerbations
Objective: To apply and compare common machine learning techniques with an expert-built Bayesian Network to determine eligibility for asthma guidelines in pediatric emergency depa...
Judith W. Dexheimer, Laura E. Brown, Jeffrey Leego...
SODA
2008
ACM
185views Algorithms» more  SODA 2008»
14 years 11 days ago
Better bounds for online load balancing on unrelated machines
We study the problem of scheduling permanent jobs on unrelated machines when the objective is to minimize the Lp norm of the machine loads. The problem is known as load balancing ...
Ioannis Caragiannis
CSREAPSC
2006
14 years 10 days ago
Design and Implementation of SONICA (Service Oriented Network Interoperability for Component Adaptation) for Multimedia Pervasiv
Abstract - Recent advances in multimedia network systems have led to the development of a new generation of applications that associate the use of various multimedia objects. The c...
Hiroshi Hayakawa, Takahiro Koita, Kenya Sato
CSREASAM
2006
14 years 10 days ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
« Prev « First page 1061 / 1092 Last » Next »